diff options
Diffstat (limited to 'security/nss/gtests/common/testvectors/dsa-vectors.h')
-rw-r--r-- | security/nss/gtests/common/testvectors/dsa-vectors.h | 12798 |
1 files changed, 12798 insertions, 0 deletions
diff --git a/security/nss/gtests/common/testvectors/dsa-vectors.h b/security/nss/gtests/common/testvectors/dsa-vectors.h new file mode 100644 index 0000000000..91d9be8a13 --- /dev/null +++ b/security/nss/gtests/common/testvectors/dsa-vectors.h @@ -0,0 +1,12798 @@ +/* vim: set ts=2 et sw=2 tw=80: */ +/* This Source Code Form is subject to the terms of the Mozilla Public + * License, v. 2.0. If a copy of the MPL was not distributed with this file, + * You can obtain one at http://mozilla.org/MPL/2.0/. */ + +/* This file is generated from sources in nss/gtests/common/wycheproof + * automatically and should not be touched manually. + * Generation is trigged by calling python3 genTestVectors.py */ + +#ifndef dsa_vectors_h__ +#define dsa_vectors_h__ + +#include "testvectors_base/test-structs.h" + +static const std::vector<uint8_t> kPubKey0{ + 0x30, 0x82, 0x01, 0xb6, 0x30, 0x82, 0x01, 0x2b, 0x06, 0x07, 0x2a, 0x86, + 0x48, 0xce, 0x38, 0x04, 0x01, 0x30, 0x82, 0x01, 0x1e, 0x02, 0x81, 0x81, + 0x00, 0xb3, 0x4c, 0xe9, 0xc1, 0xe7, 0x82, 0x94, 0xd3, 0x25, 0x84, 0x73, + 0x84, 0x20, 0x05, 0xd2, 0xa4, 0x8c, 0x8c, 0x56, 0x6c, 0xfc, 0xa8, 0xf8, + 0x4c, 0x06, 0x06, 0xf2, 0x52, 0x9b, 0x59, 0xa6, 0xd3, 0x8a, 0xae, 0x07, + 0x1b, 0x53, 0xbb, 0x21, 0x67, 0xea, 0xa4, 0xfc, 0x3b, 0x01, 0xfe, 0x17, + 0x6e, 0x78, 0x7e, 0x48, 0x1b, 0x60, 0x37, 0xaa, 0xc6, 0x2c, 0xbc, 0x3d, + 0x08, 0x97, 0x99, 0x53, 0x6a, 0x86, 0x9f, 0xa8, 0xcd, 0xfe, 0xa1, 0xe8, + 0xb1, 0xfd, 0x2d, 0x1c, 0xd3, 0xa3, 0x03, 0x50, 0x85, 0x9a, 0x2c, 0xd6, + 0xb3, 0xec, 0x2f, 0x9b, 0xfb, 0xb6, 0x8b, 0xb1, 0x1b, 0x4b, 0xbe, 0x2a, + 0xda, 0xa1, 0x8d, 0x64, 0xa9, 0x36, 0x39, 0x54, 0x3a, 0xe5, 0xe1, 0x62, + 0x93, 0xe3, 0x11, 0xc0, 0xcf, 0x8c, 0x8d, 0x6e, 0x18, 0x0d, 0xf0, 0x5d, + 0x08, 0xc2, 0xfd, 0x2d, 0x93, 0xd5, 0x70, 0x75, 0x1f, 0x02, 0x15, 0x00, + 0xb9, 0x0b, 0x38, 0xba, 0x0a, 0x50, 0xa4, 0x3e, 0xc6, 0x89, 0x8d, 0x3f, + 0x9b, 0x68, 0x04, 0x97, 0x77, 0xf4, 0x89, 0xb1, 0x02, 0x81, 0x80, 0x08, + 0x35, 0xaa, 0x8c, 0x35, 0x8b, 0xbf, 0x01, 0xa1, 0x84, 0x6d, 0x12, 0x06, + 0x32, 0x3f, 0xab, 0xe4, 0x08, 0xb0, 0xe9, 0x87, 0x89, 0xfc, 0xc6, 0x23, + 0x9d, 0xa1, 0x4d, 0x4b, 0x3f, 0x86, 0xc2, 0x76, 0xa8, 0xf4, 0x8a, 0xa8, + 0x5a, 0x59, 0x50, 0x7e, 0x62, 0x0a, 0xd1, 0xbc, 0x74, 0x5f, 0x0f, 0x1c, + 0xbf, 0x63, 0xec, 0x98, 0xc2, 0x29, 0xc2, 0x61, 0x0d, 0x77, 0xc6, 0x34, + 0xd1, 0x64, 0x2e, 0x40, 0x43, 0x54, 0x77, 0x16, 0x55, 0xb2, 0xd5, 0x66, + 0x2f, 0x7a, 0x45, 0x22, 0x71, 0x78, 0xce, 0x34, 0x30, 0xaf, 0x0f, 0x6b, + 0x3b, 0xb9, 0x4b, 0x52, 0xf7, 0xf5, 0x1e, 0x97, 0xba, 0xd6, 0x59, 0xb1, + 0xba, 0x06, 0x84, 0xe2, 0x08, 0xbe, 0x62, 0x4c, 0x28, 0xd8, 0x2f, 0xb1, + 0x16, 0x2f, 0x18, 0xdd, 0x9d, 0xce, 0x45, 0x21, 0x64, 0x61, 0x65, 0x4c, + 0xf3, 0x37, 0x46, 0x24, 0xd1, 0x5a, 0x8d, 0x03, 0x81, 0x84, 0x00, 0x02, + 0x81, 0x80, 0x17, 0x39, 0x31, 0xdd, 0xa3, 0x1e, 0xff, 0x32, 0xf2, 0x4b, + 0x38, 0x30, 0x91, 0xbf, 0x77, 0xea, 0xcd, 0xc6, 0xef, 0xd5, 0x57, 0x62, + 0x49, 0x11, 0xd8, 0xe9, 0xb9, 0xde, 0xbf, 0x0f, 0x25, 0x6d, 0x0c, 0xff, + 0xac, 0x55, 0x67, 0xb3, 0x3f, 0x6e, 0xaa, 0xe9, 0xd3, 0x27, 0x5b, 0xbe, + 0xd7, 0xef, 0x9f, 0x5f, 0x94, 0xc4, 0x00, 0x3c, 0x95, 0x9e, 0x49, 0xa1, + 0xed, 0x3f, 0x58, 0xc3, 0x1b, 0x21, 0xba, 0xcc, 0xc0, 0xed, 0x88, 0x40, + 0xb4, 0x61, 0x45, 0xf1, 0x21, 0xb8, 0x90, 0x6d, 0x07, 0x21, 0x29, 0xba, + 0xe0, 0x1f, 0x07, 0x19, 0x47, 0x99, 0x7e, 0x8e, 0xf7, 0x60, 0xd2, 0xd9, + 0xea, 0x21, 0xd0, 0x8a, 0x5e, 0xb7, 0xe8, 0x93, 0x90, 0xb2, 0x1a, 0x85, + 0x66, 0x47, 0x13, 0xc5, 0x49, 0xe2, 0x5f, 0xed, 0xa6, 0xe9, 0xe6, 0xc3, + 0x19, 0x70, 0x86, 0x6b, 0xdf, 0xbc, 0x8f, 0xa9, 0x81, 0xf6}; + +static const std::vector<uint8_t> kPubKey1{ + 0x30, 0x82, 0x01, 0xb6, 0x30, 0x82, 0x01, 0x2b, 0x06, 0x07, 0x2a, 0x86, + 0x48, 0xce, 0x38, 0x04, 0x01, 0x30, 0x82, 0x01, 0x1e, 0x02, 0x81, 0x81, + 0x00, 0xb3, 0x4c, 0xe9, 0xc1, 0xe7, 0x82, 0x94, 0xd3, 0x25, 0x84, 0x73, + 0x84, 0x20, 0x05, 0xd2, 0xa4, 0x8c, 0x8c, 0x56, 0x6c, 0xfc, 0xa8, 0xf8, + 0x4c, 0x06, 0x06, 0xf2, 0x52, 0x9b, 0x59, 0xa6, 0xd3, 0x8a, 0xae, 0x07, + 0x1b, 0x53, 0xbb, 0x21, 0x67, 0xea, 0xa4, 0xfc, 0x3b, 0x01, 0xfe, 0x17, + 0x6e, 0x78, 0x7e, 0x48, 0x1b, 0x60, 0x37, 0xaa, 0xc6, 0x2c, 0xbc, 0x3d, + 0x08, 0x97, 0x99, 0x53, 0x6a, 0x86, 0x9f, 0xa8, 0xcd, 0xfe, 0xa1, 0xe8, + 0xb1, 0xfd, 0x2d, 0x1c, 0xd3, 0xa3, 0x03, 0x50, 0x85, 0x9a, 0x2c, 0xd6, + 0xb3, 0xec, 0x2f, 0x9b, 0xfb, 0xb6, 0x8b, 0xb1, 0x1b, 0x4b, 0xbe, 0x2a, + 0xda, 0xa1, 0x8d, 0x64, 0xa9, 0x36, 0x39, 0x54, 0x3a, 0xe5, 0xe1, 0x62, + 0x93, 0xe3, 0x11, 0xc0, 0xcf, 0x8c, 0x8d, 0x6e, 0x18, 0x0d, 0xf0, 0x5d, + 0x08, 0xc2, 0xfd, 0x2d, 0x93, 0xd5, 0x70, 0x75, 0x1f, 0x02, 0x15, 0x00, + 0xb9, 0x0b, 0x38, 0xba, 0x0a, 0x50, 0xa4, 0x3e, 0xc6, 0x89, 0x8d, 0x3f, + 0x9b, 0x68, 0x04, 0x97, 0x77, 0xf4, 0x89, 0xb1, 0x02, 0x81, 0x80, 0x08, + 0x35, 0xaa, 0x8c, 0x35, 0x8b, 0xbf, 0x01, 0xa1, 0x84, 0x6d, 0x12, 0x06, + 0x32, 0x3f, 0xab, 0xe4, 0x08, 0xb0, 0xe9, 0x87, 0x89, 0xfc, 0xc6, 0x23, + 0x9d, 0xa1, 0x4d, 0x4b, 0x3f, 0x86, 0xc2, 0x76, 0xa8, 0xf4, 0x8a, 0xa8, + 0x5a, 0x59, 0x50, 0x7e, 0x62, 0x0a, 0xd1, 0xbc, 0x74, 0x5f, 0x0f, 0x1c, + 0xbf, 0x63, 0xec, 0x98, 0xc2, 0x29, 0xc2, 0x61, 0x0d, 0x77, 0xc6, 0x34, + 0xd1, 0x64, 0x2e, 0x40, 0x43, 0x54, 0x77, 0x16, 0x55, 0xb2, 0xd5, 0x66, + 0x2f, 0x7a, 0x45, 0x22, 0x71, 0x78, 0xce, 0x34, 0x30, 0xaf, 0x0f, 0x6b, + 0x3b, 0xb9, 0x4b, 0x52, 0xf7, 0xf5, 0x1e, 0x97, 0xba, 0xd6, 0x59, 0xb1, + 0xba, 0x06, 0x84, 0xe2, 0x08, 0xbe, 0x62, 0x4c, 0x28, 0xd8, 0x2f, 0xb1, + 0x16, 0x2f, 0x18, 0xdd, 0x9d, 0xce, 0x45, 0x21, 0x64, 0x61, 0x65, 0x4c, + 0xf3, 0x37, 0x46, 0x24, 0xd1, 0x5a, 0x8d, 0x03, 0x81, 0x84, 0x00, 0x02, + 0x81, 0x80, 0x71, 0x3e, 0x9f, 0x81, 0x08, 0xa6, 0xa7, 0x07, 0x54, 0x85, + 0xa3, 0x7c, 0xe1, 0xa3, 0xb0, 0x40, 0xcc, 0xe5, 0x63, 0xa0, 0x44, 0x56, + 0x14, 0xfe, 0x09, 0x9f, 0xb1, 0xbf, 0xfd, 0x68, 0xac, 0xb3, 0x6f, 0x9e, + 0x04, 0xd8, 0xad, 0x17, 0xac, 0xe3, 0xc1, 0x36, 0xda, 0x66, 0xf7, 0x30, + 0xeb, 0x7f, 0xf1, 0x89, 0x36, 0x42, 0x4f, 0xfa, 0x4e, 0x5a, 0xe5, 0xb1, + 0xe7, 0xda, 0xc3, 0x75, 0xd8, 0xd1, 0x64, 0x69, 0x72, 0x54, 0xb8, 0xb7, + 0xe8, 0x48, 0xf5, 0xe7, 0x9d, 0xa2, 0x5c, 0x79, 0xdf, 0x5c, 0x07, 0x27, + 0xd5, 0xda, 0x34, 0x98, 0x40, 0x5c, 0xd0, 0xf4, 0xe4, 0x6d, 0x13, 0x6c, + 0x35, 0x1d, 0x70, 0x3c, 0xc4, 0xbf, 0x0d, 0x3f, 0x4f, 0xbb, 0x16, 0x53, + 0x92, 0x88, 0x86, 0x84, 0x96, 0x4a, 0x93, 0xad, 0x30, 0xfa, 0x17, 0x94, + 0x88, 0xca, 0xd4, 0xa6, 0x65, 0x5d, 0xd4, 0xfa, 0x97, 0x54}; + +static const std::vector<uint8_t> kPubKey2{ + 0x30, 0x82, 0x01, 0xb4, 0x30, 0x82, 0x01, 0x2b, 0x06, 0x07, 0x2a, 0x86, + 0x48, 0xce, 0x38, 0x04, 0x01, 0x30, 0x82, 0x01, 0x1e, 0x02, 0x81, 0x81, + 0x00, 0xb3, 0x4c, 0xe9, 0xc1, 0xe7, 0x82, 0x94, 0xd3, 0x25, 0x84, 0x73, + 0x84, 0x20, 0x05, 0xd2, 0xa4, 0x8c, 0x8c, 0x56, 0x6c, 0xfc, 0xa8, 0xf8, + 0x4c, 0x06, 0x06, 0xf2, 0x52, 0x9b, 0x59, 0xa6, 0xd3, 0x8a, 0xae, 0x07, + 0x1b, 0x53, 0xbb, 0x21, 0x67, 0xea, 0xa4, 0xfc, 0x3b, 0x01, 0xfe, 0x17, + 0x6e, 0x78, 0x7e, 0x48, 0x1b, 0x60, 0x37, 0xaa, 0xc6, 0x2c, 0xbc, 0x3d, + 0x08, 0x97, 0x99, 0x53, 0x6a, 0x86, 0x9f, 0xa8, 0xcd, 0xfe, 0xa1, 0xe8, + 0xb1, 0xfd, 0x2d, 0x1c, 0xd3, 0xa3, 0x03, 0x50, 0x85, 0x9a, 0x2c, 0xd6, + 0xb3, 0xec, 0x2f, 0x9b, 0xfb, 0xb6, 0x8b, 0xb1, 0x1b, 0x4b, 0xbe, 0x2a, + 0xda, 0xa1, 0x8d, 0x64, 0xa9, 0x36, 0x39, 0x54, 0x3a, 0xe5, 0xe1, 0x62, + 0x93, 0xe3, 0x11, 0xc0, 0xcf, 0x8c, 0x8d, 0x6e, 0x18, 0x0d, 0xf0, 0x5d, + 0x08, 0xc2, 0xfd, 0x2d, 0x93, 0xd5, 0x70, 0x75, 0x1f, 0x02, 0x15, 0x00, + 0xb9, 0x0b, 0x38, 0xba, 0x0a, 0x50, 0xa4, 0x3e, 0xc6, 0x89, 0x8d, 0x3f, + 0x9b, 0x68, 0x04, 0x97, 0x77, 0xf4, 0x89, 0xb1, 0x02, 0x81, 0x80, 0x08, + 0x35, 0xaa, 0x8c, 0x35, 0x8b, 0xbf, 0x01, 0xa1, 0x84, 0x6d, 0x12, 0x06, + 0x32, 0x3f, 0xab, 0xe4, 0x08, 0xb0, 0xe9, 0x87, 0x89, 0xfc, 0xc6, 0x23, + 0x9d, 0xa1, 0x4d, 0x4b, 0x3f, 0x86, 0xc2, 0x76, 0xa8, 0xf4, 0x8a, 0xa8, + 0x5a, 0x59, 0x50, 0x7e, 0x62, 0x0a, 0xd1, 0xbc, 0x74, 0x5f, 0x0f, 0x1c, + 0xbf, 0x63, 0xec, 0x98, 0xc2, 0x29, 0xc2, 0x61, 0x0d, 0x77, 0xc6, 0x34, + 0xd1, 0x64, 0x2e, 0x40, 0x43, 0x54, 0x77, 0x16, 0x55, 0xb2, 0xd5, 0x66, + 0x2f, 0x7a, 0x45, 0x22, 0x71, 0x78, 0xce, 0x34, 0x30, 0xaf, 0x0f, 0x6b, + 0x3b, 0xb9, 0x4b, 0x52, 0xf7, 0xf5, 0x1e, 0x97, 0xba, 0xd6, 0x59, 0xb1, + 0xba, 0x06, 0x84, 0xe2, 0x08, 0xbe, 0x62, 0x4c, 0x28, 0xd8, 0x2f, 0xb1, + 0x16, 0x2f, 0x18, 0xdd, 0x9d, 0xce, 0x45, 0x21, 0x64, 0x61, 0x65, 0x4c, + 0xf3, 0x37, 0x46, 0x24, 0xd1, 0x5a, 0x8d, 0x03, 0x81, 0x82, 0x00, 0x02, + 0x7f, 0x61, 0xfe, 0x5b, 0x61, 0xf6, 0xd5, 0x55, 0xad, 0xa7, 0xdc, 0x0e, + 0xba, 0xc3, 0x45, 0x9f, 0xcc, 0xd8, 0xdf, 0xba, 0xd1, 0x8b, 0xa9, 0x4d, + 0xbe, 0xa5, 0x24, 0x37, 0xcd, 0x7f, 0xb4, 0x31, 0xdf, 0x40, 0x4d, 0x47, + 0x38, 0xc5, 0x94, 0xe7, 0x20, 0xa6, 0xd7, 0x86, 0x27, 0x5a, 0xcd, 0x02, + 0x25, 0x9c, 0xa6, 0x13, 0xa0, 0x8a, 0x2d, 0xe1, 0x18, 0xd0, 0x15, 0x0d, + 0x2c, 0xca, 0xe6, 0x02, 0x10, 0x2a, 0xca, 0x0c, 0xd0, 0x36, 0x66, 0xa5, + 0x3f, 0x67, 0xc0, 0xb9, 0x94, 0x3d, 0xf5, 0x04, 0x6c, 0x15, 0xba, 0xea, + 0xf4, 0x96, 0xa9, 0xf0, 0x18, 0xb7, 0xc9, 0x39, 0xde, 0x15, 0x09, 0xde, + 0x71, 0xce, 0x47, 0xdd, 0x6f, 0x44, 0xc5, 0x7f, 0x4e, 0x01, 0xe5, 0x69, + 0xbe, 0x46, 0x93, 0x27, 0x73, 0x19, 0x0c, 0x15, 0x44, 0x70, 0xce, 0xfb, + 0xd1, 0xf4, 0xaf, 0x82, 0xd2, 0x8e, 0x4b, 0x31}; + +static const std::vector<uint8_t> kPubKey3{ + 0x30, 0x82, 0x03, 0x42, 0x30, 0x82, 0x02, 0x35, 0x06, 0x07, 0x2a, 0x86, + 0x48, 0xce, 0x38, 0x04, 0x01, 0x30, 0x82, 0x02, 0x28, 0x02, 0x82, 0x01, + 0x01, 0x00, 0x8f, 0x79, 0x35, 0xd9, 0xb9, 0xaa, 0xe9, 0xbf, 0xab, 0xed, + 0x88, 0x7a, 0xcf, 0x49, 0x51, 0xb6, 0xf3, 0x2e, 0xc5, 0x9e, 0x3b, 0xaf, + 0x37, 0x18, 0xe8, 0xea, 0xc4, 0x96, 0x1f, 0x3e, 0xfd, 0x36, 0x06, 0xe7, + 0x43, 0x51, 0xa9, 0xc4, 0x18, 0x33, 0x39, 0xb8, 0x09, 0xe7, 0xc2, 0xae, + 0x1c, 0x53, 0x9b, 0xa7, 0x47, 0x5b, 0x85, 0xd0, 0x11, 0xad, 0xb8, 0xb4, + 0x79, 0x87, 0x75, 0x49, 0x84, 0x69, 0x5c, 0xac, 0x0e, 0x8f, 0x14, 0xb3, + 0x36, 0x08, 0x28, 0xa2, 0x2f, 0xfa, 0x27, 0x11, 0x0a, 0x3d, 0x62, 0xa9, + 0x93, 0x45, 0x34, 0x09, 0xa0, 0xfe, 0x69, 0x6c, 0x46, 0x58, 0xf8, 0x4b, + 0xdd, 0x20, 0x81, 0x9c, 0x37, 0x09, 0xa0, 0x10, 0x57, 0xb1, 0x95, 0xad, + 0xcd, 0x00, 0x23, 0x3d, 0xba, 0x54, 0x84, 0xb6, 0x29, 0x1f, 0x9d, 0x64, + 0x8e, 0xf8, 0x83, 0x44, 0x86, 0x77, 0x97, 0x9c, 0xec, 0x04, 0xb4, 0x34, + 0xa6, 0xac, 0x2e, 0x75, 0xe9, 0x98, 0x5d, 0xe2, 0x3d, 0xb0, 0x29, 0x2f, + 0xc1, 0x11, 0x8c, 0x9f, 0xfa, 0x9d, 0x81, 0x81, 0xe7, 0x33, 0x8d, 0xb7, + 0x92, 0xb7, 0x30, 0xd7, 0xb9, 0xe3, 0x49, 0x59, 0x2f, 0x68, 0x09, 0x98, + 0x72, 0x15, 0x39, 0x15, 0xea, 0x3d, 0x6b, 0x8b, 0x46, 0x53, 0xc6, 0x33, + 0x45, 0x8f, 0x80, 0x3b, 0x32, 0xa4, 0xc2, 0xe0, 0xf2, 0x72, 0x90, 0x25, + 0x6e, 0x4e, 0x3f, 0x8a, 0x3b, 0x08, 0x38, 0xa1, 0xc4, 0x50, 0xe4, 0xe1, + 0x8c, 0x1a, 0x29, 0xa3, 0x7d, 0xdf, 0x5e, 0xa1, 0x43, 0xde, 0x4b, 0x66, + 0xff, 0x04, 0x90, 0x3e, 0xd5, 0xcf, 0x16, 0x23, 0xe1, 0x58, 0xd4, 0x87, + 0xc6, 0x08, 0xe9, 0x7f, 0x21, 0x1c, 0xd8, 0x1d, 0xca, 0x23, 0xcb, 0x6e, + 0x38, 0x07, 0x65, 0xf8, 0x22, 0xe3, 0x42, 0xbe, 0x48, 0x4c, 0x05, 0x76, + 0x39, 0x39, 0x60, 0x1c, 0xd6, 0x67, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, + 0xa6, 0x85, 0x78, 0xf7, 0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, + 0x85, 0xef, 0x32, 0xb2, 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, + 0x5d, 0x02, 0x82, 0x01, 0x00, 0x16, 0xa6, 0x5c, 0x58, 0x20, 0x48, 0x50, + 0x70, 0x4e, 0x75, 0x02, 0xa3, 0x97, 0x57, 0x04, 0x0d, 0x34, 0xda, 0x3a, + 0x34, 0x78, 0xc1, 0x54, 0xd4, 0xe4, 0xa5, 0xc0, 0x2d, 0x24, 0x2e, 0xe0, + 0x4f, 0x96, 0xe6, 0x1e, 0x4b, 0xd0, 0x90, 0x4a, 0xbd, 0xac, 0x8f, 0x37, + 0xee, 0xb1, 0xe0, 0x9f, 0x31, 0x82, 0xd2, 0x3c, 0x90, 0x43, 0xcb, 0x64, + 0x2f, 0x88, 0x00, 0x41, 0x60, 0xed, 0xf9, 0xca, 0x09, 0xb3, 0x20, 0x76, + 0xa7, 0x9c, 0x32, 0xa6, 0x27, 0xf2, 0x47, 0x3e, 0x91, 0x87, 0x9b, 0xa2, + 0xc4, 0xe7, 0x44, 0xbd, 0x20, 0x81, 0x54, 0x4c, 0xb5, 0x5b, 0x80, 0x2c, + 0x36, 0x8d, 0x1f, 0xa8, 0x3e, 0xd4, 0x89, 0xe9, 0x4e, 0x0f, 0xa0, 0x68, + 0x8e, 0x32, 0x42, 0x8a, 0x5c, 0x78, 0xc4, 0x78, 0xc6, 0x8d, 0x05, 0x27, + 0xb7, 0x1c, 0x9a, 0x3a, 0xbb, 0x0b, 0x0b, 0xe1, 0x2c, 0x44, 0x68, 0x96, + 0x39, 0xe7, 0xd3, 0xce, 0x74, 0xdb, 0x10, 0x1a, 0x65, 0xaa, 0x2b, 0x87, + 0xf6, 0x4c, 0x68, 0x26, 0xdb, 0x3e, 0xc7, 0x2f, 0x4b, 0x55, 0x99, 0x83, + 0x4b, 0xb4, 0xed, 0xb0, 0x2f, 0x7c, 0x90, 0xe9, 0xa4, 0x96, 0xd3, 0xa5, + 0x5d, 0x53, 0x5b, 0xeb, 0xfc, 0x45, 0xd4, 0xf6, 0x19, 0xf6, 0x3f, 0x3d, + 0xed, 0xbb, 0x87, 0x39, 0x25, 0xc2, 0xf2, 0x24, 0xe0, 0x77, 0x31, 0x29, + 0x6d, 0xa8, 0x87, 0xec, 0x1e, 0x47, 0x48, 0xf8, 0x7e, 0xfb, 0x5f, 0xde, + 0xb7, 0x54, 0x84, 0x31, 0x6b, 0x22, 0x32, 0xde, 0xe5, 0x53, 0xdd, 0xaf, + 0x02, 0x11, 0x2b, 0x0d, 0x1f, 0x02, 0xda, 0x30, 0x97, 0x32, 0x24, 0xfe, + 0x27, 0xae, 0xda, 0x8b, 0x9d, 0x4b, 0x29, 0x22, 0xd9, 0xba, 0x8b, 0xe3, + 0x9e, 0xd9, 0xe1, 0x03, 0xa6, 0x3c, 0x52, 0x81, 0x0b, 0xc6, 0x88, 0xb7, + 0xe2, 0xed, 0x43, 0x16, 0xe1, 0xef, 0x17, 0xdb, 0xde, 0x03, 0x82, 0x01, + 0x05, 0x00, 0x02, 0x82, 0x01, 0x00, 0x1e, 0x77, 0xf8, 0x42, 0xb1, 0xae, + 0x0f, 0xcd, 0x99, 0x29, 0xd3, 0x94, 0x16, 0x1d, 0x41, 0xe1, 0x46, 0x14, + 0xff, 0x75, 0x07, 0xa9, 0xa3, 0x1f, 0x4a, 0x1f, 0x14, 0xd2, 0x2e, 0x2a, + 0x62, 0x7a, 0x1f, 0x4e, 0x59, 0x66, 0x24, 0x88, 0x3f, 0x1a, 0x5b, 0x16, + 0x8e, 0x94, 0x25, 0x14, 0x6f, 0x22, 0xd5, 0xf6, 0xee, 0x28, 0x75, 0x74, + 0x14, 0x71, 0x4b, 0xb9, 0x94, 0xba, 0x11, 0x29, 0xf0, 0x15, 0xd6, 0xe0, + 0x4a, 0x71, 0x7e, 0xdf, 0x9b, 0x53, 0x0a, 0x5d, 0x5c, 0xab, 0x94, 0xf1, + 0x46, 0x31, 0xe8, 0xb4, 0xcf, 0x79, 0xae, 0xb3, 0x58, 0xcc, 0x74, 0x18, + 0x45, 0x55, 0x38, 0x41, 0xe8, 0xac, 0x46, 0x16, 0x30, 0xe8, 0x04, 0xa6, + 0x2f, 0x43, 0x67, 0x6b, 0xa6, 0x79, 0x4a, 0xf6, 0x68, 0x99, 0xc3, 0x77, + 0xb8, 0x69, 0xea, 0x61, 0x2a, 0x7b, 0x9f, 0xe6, 0x61, 0x1a, 0xa9, 0x6b, + 0xe5, 0x2e, 0xb8, 0xb6, 0x2c, 0x97, 0x91, 0x17, 0xbb, 0xbc, 0xca, 0x8a, + 0x7e, 0xc1, 0xe1, 0xff, 0xab, 0x1c, 0x7d, 0xfc, 0xfc, 0x70, 0x48, 0x70, + 0x0d, 0x3a, 0xe3, 0x85, 0x81, 0x36, 0xe8, 0x97, 0x70, 0x1d, 0x7c, 0x29, + 0x21, 0xb5, 0xdf, 0xef, 0x1d, 0x1f, 0x89, 0x7f, 0x50, 0xd9, 0x6c, 0xa1, + 0xb5, 0xc2, 0xed, 0xc5, 0x8c, 0xad, 0xa1, 0x89, 0x19, 0xe3, 0x56, 0x42, + 0xf0, 0x80, 0x7e, 0xeb, 0xfa, 0x00, 0xc9, 0x9a, 0x32, 0xf4, 0xd0, 0x95, + 0xc3, 0x18, 0x8f, 0x78, 0xed, 0x54, 0x71, 0x1b, 0xe0, 0x32, 0x5c, 0x4b, + 0x53, 0x2a, 0xec, 0xcd, 0x65, 0x40, 0xa5, 0x67, 0xc3, 0x27, 0x22, 0x54, + 0x40, 0xea, 0x15, 0x31, 0x9b, 0xde, 0x06, 0x51, 0x04, 0x79, 0xa1, 0x86, + 0x17, 0x99, 0xe2, 0x5b, 0x57, 0xde, 0xcc, 0x73, 0xc0, 0x36, 0xd7, 0x5a, + 0x07, 0x02, 0xbd, 0x37, 0x3c, 0xa2, 0x31, 0x34, 0x99, 0x31}; + +static const std::vector<uint8_t> kPubKey4{ + 0x30, 0x82, 0x03, 0x42, 0x30, 0x82, 0x02, 0x35, 0x06, 0x07, 0x2a, 0x86, + 0x48, 0xce, 0x38, 0x04, 0x01, 0x30, 0x82, 0x02, 0x28, 0x02, 0x82, 0x01, + 0x01, 0x00, 0x8f, 0x79, 0x35, 0xd9, 0xb9, 0xaa, 0xe9, 0xbf, 0xab, 0xed, + 0x88, 0x7a, 0xcf, 0x49, 0x51, 0xb6, 0xf3, 0x2e, 0xc5, 0x9e, 0x3b, 0xaf, + 0x37, 0x18, 0xe8, 0xea, 0xc4, 0x96, 0x1f, 0x3e, 0xfd, 0x36, 0x06, 0xe7, + 0x43, 0x51, 0xa9, 0xc4, 0x18, 0x33, 0x39, 0xb8, 0x09, 0xe7, 0xc2, 0xae, + 0x1c, 0x53, 0x9b, 0xa7, 0x47, 0x5b, 0x85, 0xd0, 0x11, 0xad, 0xb8, 0xb4, + 0x79, 0x87, 0x75, 0x49, 0x84, 0x69, 0x5c, 0xac, 0x0e, 0x8f, 0x14, 0xb3, + 0x36, 0x08, 0x28, 0xa2, 0x2f, 0xfa, 0x27, 0x11, 0x0a, 0x3d, 0x62, 0xa9, + 0x93, 0x45, 0x34, 0x09, 0xa0, 0xfe, 0x69, 0x6c, 0x46, 0x58, 0xf8, 0x4b, + 0xdd, 0x20, 0x81, 0x9c, 0x37, 0x09, 0xa0, 0x10, 0x57, 0xb1, 0x95, 0xad, + 0xcd, 0x00, 0x23, 0x3d, 0xba, 0x54, 0x84, 0xb6, 0x29, 0x1f, 0x9d, 0x64, + 0x8e, 0xf8, 0x83, 0x44, 0x86, 0x77, 0x97, 0x9c, 0xec, 0x04, 0xb4, 0x34, + 0xa6, 0xac, 0x2e, 0x75, 0xe9, 0x98, 0x5d, 0xe2, 0x3d, 0xb0, 0x29, 0x2f, + 0xc1, 0x11, 0x8c, 0x9f, 0xfa, 0x9d, 0x81, 0x81, 0xe7, 0x33, 0x8d, 0xb7, + 0x92, 0xb7, 0x30, 0xd7, 0xb9, 0xe3, 0x49, 0x59, 0x2f, 0x68, 0x09, 0x98, + 0x72, 0x15, 0x39, 0x15, 0xea, 0x3d, 0x6b, 0x8b, 0x46, 0x53, 0xc6, 0x33, + 0x45, 0x8f, 0x80, 0x3b, 0x32, 0xa4, 0xc2, 0xe0, 0xf2, 0x72, 0x90, 0x25, + 0x6e, 0x4e, 0x3f, 0x8a, 0x3b, 0x08, 0x38, 0xa1, 0xc4, 0x50, 0xe4, 0xe1, + 0x8c, 0x1a, 0x29, 0xa3, 0x7d, 0xdf, 0x5e, 0xa1, 0x43, 0xde, 0x4b, 0x66, + 0xff, 0x04, 0x90, 0x3e, 0xd5, 0xcf, 0x16, 0x23, 0xe1, 0x58, 0xd4, 0x87, + 0xc6, 0x08, 0xe9, 0x7f, 0x21, 0x1c, 0xd8, 0x1d, 0xca, 0x23, 0xcb, 0x6e, + 0x38, 0x07, 0x65, 0xf8, 0x22, 0xe3, 0x42, 0xbe, 0x48, 0x4c, 0x05, 0x76, + 0x39, 0x39, 0x60, 0x1c, 0xd6, 0x67, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, + 0xa6, 0x85, 0x78, 0xf7, 0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, + 0x85, 0xef, 0x32, 0xb2, 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, + 0x5d, 0x02, 0x82, 0x01, 0x00, 0x16, 0xa6, 0x5c, 0x58, 0x20, 0x48, 0x50, + 0x70, 0x4e, 0x75, 0x02, 0xa3, 0x97, 0x57, 0x04, 0x0d, 0x34, 0xda, 0x3a, + 0x34, 0x78, 0xc1, 0x54, 0xd4, 0xe4, 0xa5, 0xc0, 0x2d, 0x24, 0x2e, 0xe0, + 0x4f, 0x96, 0xe6, 0x1e, 0x4b, 0xd0, 0x90, 0x4a, 0xbd, 0xac, 0x8f, 0x37, + 0xee, 0xb1, 0xe0, 0x9f, 0x31, 0x82, 0xd2, 0x3c, 0x90, 0x43, 0xcb, 0x64, + 0x2f, 0x88, 0x00, 0x41, 0x60, 0xed, 0xf9, 0xca, 0x09, 0xb3, 0x20, 0x76, + 0xa7, 0x9c, 0x32, 0xa6, 0x27, 0xf2, 0x47, 0x3e, 0x91, 0x87, 0x9b, 0xa2, + 0xc4, 0xe7, 0x44, 0xbd, 0x20, 0x81, 0x54, 0x4c, 0xb5, 0x5b, 0x80, 0x2c, + 0x36, 0x8d, 0x1f, 0xa8, 0x3e, 0xd4, 0x89, 0xe9, 0x4e, 0x0f, 0xa0, 0x68, + 0x8e, 0x32, 0x42, 0x8a, 0x5c, 0x78, 0xc4, 0x78, 0xc6, 0x8d, 0x05, 0x27, + 0xb7, 0x1c, 0x9a, 0x3a, 0xbb, 0x0b, 0x0b, 0xe1, 0x2c, 0x44, 0x68, 0x96, + 0x39, 0xe7, 0xd3, 0xce, 0x74, 0xdb, 0x10, 0x1a, 0x65, 0xaa, 0x2b, 0x87, + 0xf6, 0x4c, 0x68, 0x26, 0xdb, 0x3e, 0xc7, 0x2f, 0x4b, 0x55, 0x99, 0x83, + 0x4b, 0xb4, 0xed, 0xb0, 0x2f, 0x7c, 0x90, 0xe9, 0xa4, 0x96, 0xd3, 0xa5, + 0x5d, 0x53, 0x5b, 0xeb, 0xfc, 0x45, 0xd4, 0xf6, 0x19, 0xf6, 0x3f, 0x3d, + 0xed, 0xbb, 0x87, 0x39, 0x25, 0xc2, 0xf2, 0x24, 0xe0, 0x77, 0x31, 0x29, + 0x6d, 0xa8, 0x87, 0xec, 0x1e, 0x47, 0x48, 0xf8, 0x7e, 0xfb, 0x5f, 0xde, + 0xb7, 0x54, 0x84, 0x31, 0x6b, 0x22, 0x32, 0xde, 0xe5, 0x53, 0xdd, 0xaf, + 0x02, 0x11, 0x2b, 0x0d, 0x1f, 0x02, 0xda, 0x30, 0x97, 0x32, 0x24, 0xfe, + 0x27, 0xae, 0xda, 0x8b, 0x9d, 0x4b, 0x29, 0x22, 0xd9, 0xba, 0x8b, 0xe3, + 0x9e, 0xd9, 0xe1, 0x03, 0xa6, 0x3c, 0x52, 0x81, 0x0b, 0xc6, 0x88, 0xb7, + 0xe2, 0xed, 0x43, 0x16, 0xe1, 0xef, 0x17, 0xdb, 0xde, 0x03, 0x82, 0x01, + 0x05, 0x00, 0x02, 0x82, 0x01, 0x00, 0x69, 0x78, 0xb6, 0x8d, 0x31, 0x33, + 0x4e, 0xe5, 0xbc, 0x7b, 0x3e, 0x91, 0xab, 0x6c, 0x23, 0x36, 0xfa, 0xb4, + 0x5c, 0x64, 0x83, 0x6b, 0xd9, 0x2c, 0xb5, 0x33, 0x7b, 0x73, 0x4d, 0xb9, + 0xe8, 0xe4, 0x4f, 0x88, 0x9f, 0x88, 0x69, 0x82, 0x9f, 0x4f, 0xe1, 0x74, + 0xdc, 0x93, 0x44, 0xc1, 0x64, 0xa0, 0xba, 0x5b, 0x01, 0x26, 0x25, 0x9b, + 0xa8, 0xa4, 0x3f, 0x60, 0x75, 0x64, 0xfa, 0x4a, 0x1d, 0x0d, 0x49, 0x64, + 0x5e, 0x1d, 0x58, 0x86, 0xa1, 0xfc, 0x48, 0x5e, 0x2f, 0xe9, 0x1e, 0x56, + 0xea, 0xe3, 0x30, 0xda, 0x05, 0xe1, 0x7b, 0x0b, 0x3d, 0x01, 0x8c, 0x29, + 0x02, 0x85, 0xb2, 0x49, 0xbc, 0x40, 0x9e, 0x7a, 0xf5, 0x43, 0x00, 0xfc, + 0x7c, 0x3e, 0xb3, 0x49, 0x11, 0x45, 0x7e, 0x23, 0x71, 0x93, 0x1a, 0xd9, + 0x30, 0x2e, 0x84, 0x50, 0xcd, 0x95, 0xdf, 0x3d, 0x56, 0x1e, 0xa0, 0xad, + 0x94, 0xd0, 0xa2, 0xea, 0xbc, 0xaf, 0xe0, 0xdd, 0x67, 0x28, 0xfb, 0x28, + 0x00, 0x29, 0xb5, 0x56, 0xd9, 0xf4, 0xfa, 0x7c, 0x0f, 0x46, 0xa7, 0x80, + 0x43, 0x29, 0x93, 0x67, 0x08, 0xe9, 0x7e, 0x11, 0xfc, 0x22, 0xb2, 0xa5, + 0x07, 0x61, 0xa8, 0x90, 0xc6, 0x5b, 0x5f, 0xea, 0x2a, 0x1a, 0x41, 0x72, + 0xf6, 0xbe, 0x9e, 0xaa, 0x60, 0xe7, 0x38, 0xcd, 0xf6, 0x0c, 0x01, 0x51, + 0x42, 0xe2, 0xe5, 0x62, 0xbb, 0x62, 0xa1, 0x1e, 0x81, 0x0c, 0xcd, 0xf0, + 0xbf, 0x63, 0x33, 0x07, 0x38, 0x2f, 0x2d, 0x9a, 0x97, 0x69, 0xb1, 0x15, + 0xdf, 0xcd, 0xab, 0x4b, 0xac, 0xae, 0x73, 0xfe, 0xca, 0x28, 0x9d, 0xb2, + 0x09, 0xdc, 0xe3, 0x4c, 0xbe, 0x12, 0x6e, 0x8c, 0x7f, 0x9d, 0x9e, 0x4f, + 0x8f, 0x71, 0x13, 0x49, 0xa6, 0x08, 0xd5, 0x67, 0xb4, 0x8c, 0x05, 0x0e, + 0x9d, 0xfb, 0x32, 0xbc, 0x18, 0x4e, 0xca, 0xa4, 0xf0, 0xf0}; + +static const std::vector<uint8_t> kPubKey5{ + 0x30, 0x82, 0x03, 0x42, 0x30, 0x82, 0x02, 0x35, 0x06, 0x07, 0x2a, 0x86, + 0x48, 0xce, 0x38, 0x04, 0x01, 0x30, 0x82, 0x02, 0x28, 0x02, 0x82, 0x01, + 0x01, 0x00, 0x8f, 0x79, 0x35, 0xd9, 0xb9, 0xaa, 0xe9, 0xbf, 0xab, 0xed, + 0x88, 0x7a, 0xcf, 0x49, 0x51, 0xb6, 0xf3, 0x2e, 0xc5, 0x9e, 0x3b, 0xaf, + 0x37, 0x18, 0xe8, 0xea, 0xc4, 0x96, 0x1f, 0x3e, 0xfd, 0x36, 0x06, 0xe7, + 0x43, 0x51, 0xa9, 0xc4, 0x18, 0x33, 0x39, 0xb8, 0x09, 0xe7, 0xc2, 0xae, + 0x1c, 0x53, 0x9b, 0xa7, 0x47, 0x5b, 0x85, 0xd0, 0x11, 0xad, 0xb8, 0xb4, + 0x79, 0x87, 0x75, 0x49, 0x84, 0x69, 0x5c, 0xac, 0x0e, 0x8f, 0x14, 0xb3, + 0x36, 0x08, 0x28, 0xa2, 0x2f, 0xfa, 0x27, 0x11, 0x0a, 0x3d, 0x62, 0xa9, + 0x93, 0x45, 0x34, 0x09, 0xa0, 0xfe, 0x69, 0x6c, 0x46, 0x58, 0xf8, 0x4b, + 0xdd, 0x20, 0x81, 0x9c, 0x37, 0x09, 0xa0, 0x10, 0x57, 0xb1, 0x95, 0xad, + 0xcd, 0x00, 0x23, 0x3d, 0xba, 0x54, 0x84, 0xb6, 0x29, 0x1f, 0x9d, 0x64, + 0x8e, 0xf8, 0x83, 0x44, 0x86, 0x77, 0x97, 0x9c, 0xec, 0x04, 0xb4, 0x34, + 0xa6, 0xac, 0x2e, 0x75, 0xe9, 0x98, 0x5d, 0xe2, 0x3d, 0xb0, 0x29, 0x2f, + 0xc1, 0x11, 0x8c, 0x9f, 0xfa, 0x9d, 0x81, 0x81, 0xe7, 0x33, 0x8d, 0xb7, + 0x92, 0xb7, 0x30, 0xd7, 0xb9, 0xe3, 0x49, 0x59, 0x2f, 0x68, 0x09, 0x98, + 0x72, 0x15, 0x39, 0x15, 0xea, 0x3d, 0x6b, 0x8b, 0x46, 0x53, 0xc6, 0x33, + 0x45, 0x8f, 0x80, 0x3b, 0x32, 0xa4, 0xc2, 0xe0, 0xf2, 0x72, 0x90, 0x25, + 0x6e, 0x4e, 0x3f, 0x8a, 0x3b, 0x08, 0x38, 0xa1, 0xc4, 0x50, 0xe4, 0xe1, + 0x8c, 0x1a, 0x29, 0xa3, 0x7d, 0xdf, 0x5e, 0xa1, 0x43, 0xde, 0x4b, 0x66, + 0xff, 0x04, 0x90, 0x3e, 0xd5, 0xcf, 0x16, 0x23, 0xe1, 0x58, 0xd4, 0x87, + 0xc6, 0x08, 0xe9, 0x7f, 0x21, 0x1c, 0xd8, 0x1d, 0xca, 0x23, 0xcb, 0x6e, + 0x38, 0x07, 0x65, 0xf8, 0x22, 0xe3, 0x42, 0xbe, 0x48, 0x4c, 0x05, 0x76, + 0x39, 0x39, 0x60, 0x1c, 0xd6, 0x67, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, + 0xa6, 0x85, 0x78, 0xf7, 0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, + 0x85, 0xef, 0x32, 0xb2, 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, + 0x5d, 0x02, 0x82, 0x01, 0x00, 0x16, 0xa6, 0x5c, 0x58, 0x20, 0x48, 0x50, + 0x70, 0x4e, 0x75, 0x02, 0xa3, 0x97, 0x57, 0x04, 0x0d, 0x34, 0xda, 0x3a, + 0x34, 0x78, 0xc1, 0x54, 0xd4, 0xe4, 0xa5, 0xc0, 0x2d, 0x24, 0x2e, 0xe0, + 0x4f, 0x96, 0xe6, 0x1e, 0x4b, 0xd0, 0x90, 0x4a, 0xbd, 0xac, 0x8f, 0x37, + 0xee, 0xb1, 0xe0, 0x9f, 0x31, 0x82, 0xd2, 0x3c, 0x90, 0x43, 0xcb, 0x64, + 0x2f, 0x88, 0x00, 0x41, 0x60, 0xed, 0xf9, 0xca, 0x09, 0xb3, 0x20, 0x76, + 0xa7, 0x9c, 0x32, 0xa6, 0x27, 0xf2, 0x47, 0x3e, 0x91, 0x87, 0x9b, 0xa2, + 0xc4, 0xe7, 0x44, 0xbd, 0x20, 0x81, 0x54, 0x4c, 0xb5, 0x5b, 0x80, 0x2c, + 0x36, 0x8d, 0x1f, 0xa8, 0x3e, 0xd4, 0x89, 0xe9, 0x4e, 0x0f, 0xa0, 0x68, + 0x8e, 0x32, 0x42, 0x8a, 0x5c, 0x78, 0xc4, 0x78, 0xc6, 0x8d, 0x05, 0x27, + 0xb7, 0x1c, 0x9a, 0x3a, 0xbb, 0x0b, 0x0b, 0xe1, 0x2c, 0x44, 0x68, 0x96, + 0x39, 0xe7, 0xd3, 0xce, 0x74, 0xdb, 0x10, 0x1a, 0x65, 0xaa, 0x2b, 0x87, + 0xf6, 0x4c, 0x68, 0x26, 0xdb, 0x3e, 0xc7, 0x2f, 0x4b, 0x55, 0x99, 0x83, + 0x4b, 0xb4, 0xed, 0xb0, 0x2f, 0x7c, 0x90, 0xe9, 0xa4, 0x96, 0xd3, 0xa5, + 0x5d, 0x53, 0x5b, 0xeb, 0xfc, 0x45, 0xd4, 0xf6, 0x19, 0xf6, 0x3f, 0x3d, + 0xed, 0xbb, 0x87, 0x39, 0x25, 0xc2, 0xf2, 0x24, 0xe0, 0x77, 0x31, 0x29, + 0x6d, 0xa8, 0x87, 0xec, 0x1e, 0x47, 0x48, 0xf8, 0x7e, 0xfb, 0x5f, 0xde, + 0xb7, 0x54, 0x84, 0x31, 0x6b, 0x22, 0x32, 0xde, 0xe5, 0x53, 0xdd, 0xaf, + 0x02, 0x11, 0x2b, 0x0d, 0x1f, 0x02, 0xda, 0x30, 0x97, 0x32, 0x24, 0xfe, + 0x27, 0xae, 0xda, 0x8b, 0x9d, 0x4b, 0x29, 0x22, 0xd9, 0xba, 0x8b, 0xe3, + 0x9e, 0xd9, 0xe1, 0x03, 0xa6, 0x3c, 0x52, 0x81, 0x0b, 0xc6, 0x88, 0xb7, + 0xe2, 0xed, 0x43, 0x16, 0xe1, 0xef, 0x17, 0xdb, 0xde, 0x03, 0x82, 0x01, + 0x05, 0x00, 0x02, 0x82, 0x01, 0x00, 0x2a, 0x64, 0x95, 0x3b, 0xde, 0x40, + 0x78, 0x9f, 0x80, 0xed, 0x82, 0x27, 0x19, 0x22, 0x86, 0x11, 0x5b, 0x92, + 0xd0, 0x9d, 0x5d, 0xe9, 0x69, 0x04, 0xe8, 0x03, 0xec, 0x4e, 0xcf, 0xbd, + 0x73, 0xe0, 0xf0, 0x8e, 0x82, 0x91, 0x0f, 0xeb, 0xf1, 0x9f, 0xa3, 0xcd, + 0xc5, 0x5f, 0xf2, 0x0e, 0xb9, 0x70, 0xd9, 0xc7, 0x12, 0xf4, 0x47, 0x85, + 0xc0, 0xfd, 0x59, 0x2c, 0x17, 0xfb, 0x43, 0xf4, 0x62, 0x53, 0x57, 0xa4, + 0xac, 0x8a, 0x1a, 0x62, 0x8f, 0x72, 0x04, 0x0a, 0xe5, 0x36, 0x08, 0x39, + 0xc7, 0xc1, 0xf6, 0xb2, 0x14, 0xe7, 0xa1, 0x55, 0x30, 0xfe, 0x22, 0x88, + 0x71, 0x39, 0xea, 0x0f, 0x05, 0xa9, 0xda, 0xf9, 0xd9, 0x5b, 0xd6, 0xb7, + 0x46, 0x7a, 0xbf, 0x91, 0x07, 0xc9, 0xfb, 0xe3, 0x1e, 0x36, 0x33, 0x02, + 0x76, 0xee, 0xcc, 0xce, 0x3d, 0x59, 0x63, 0x52, 0x06, 0xd6, 0x0c, 0xa2, + 0x56, 0xf9, 0xaf, 0x60, 0x62, 0x76, 0x26, 0xb0, 0x59, 0x49, 0x84, 0xb5, + 0xa0, 0x75, 0xc4, 0x2c, 0x42, 0x06, 0x7f, 0xa8, 0xc3, 0x30, 0xf2, 0x58, + 0xbc, 0xf1, 0x45, 0xdf, 0x27, 0xa9, 0x7d, 0xa8, 0xee, 0x41, 0x9b, 0x54, + 0xe3, 0xab, 0x29, 0x6c, 0x7c, 0xe9, 0xef, 0x6a, 0x01, 0x13, 0x38, 0x9b, + 0x3c, 0xac, 0x78, 0x85, 0xb4, 0x4b, 0x37, 0x22, 0xd2, 0x7c, 0xad, 0x60, + 0xe4, 0xe5, 0xa9, 0x24, 0xa1, 0xed, 0x03, 0x42, 0xce, 0xa9, 0xe9, 0x92, + 0x56, 0xf6, 0xbc, 0x13, 0x08, 0xd4, 0xaf, 0x2c, 0x0a, 0xf9, 0x37, 0x9b, + 0x1c, 0xf2, 0x11, 0x9c, 0xe1, 0x13, 0xc0, 0x85, 0x70, 0x5f, 0x55, 0x19, + 0xcc, 0xc1, 0xba, 0x85, 0x62, 0xa2, 0x23, 0x61, 0x90, 0xd3, 0xf0, 0xc0, + 0xa1, 0x0f, 0x01, 0x46, 0x6a, 0xd7, 0x9a, 0x48, 0x12, 0x7c, 0x28, 0x43, + 0x3f, 0x6b, 0x34, 0xe2, 0x4a, 0x53, 0x9a, 0xf6, 0x0f, 0x3d}; + +static const std::vector<uint8_t> kPubKey6{ + 0x30, 0x82, 0x03, 0x43, 0x30, 0x82, 0x02, 0x35, 0x06, 0x07, 0x2a, 0x86, + 0x48, 0xce, 0x38, 0x04, 0x01, 0x30, 0x82, 0x02, 0x28, 0x02, 0x82, 0x01, + 0x01, 0x00, 0x8f, 0x79, 0x35, 0xd9, 0xb9, 0xaa, 0xe9, 0xbf, 0xab, 0xed, + 0x88, 0x7a, 0xcf, 0x49, 0x51, 0xb6, 0xf3, 0x2e, 0xc5, 0x9e, 0x3b, 0xaf, + 0x37, 0x18, 0xe8, 0xea, 0xc4, 0x96, 0x1f, 0x3e, 0xfd, 0x36, 0x06, 0xe7, + 0x43, 0x51, 0xa9, 0xc4, 0x18, 0x33, 0x39, 0xb8, 0x09, 0xe7, 0xc2, 0xae, + 0x1c, 0x53, 0x9b, 0xa7, 0x47, 0x5b, 0x85, 0xd0, 0x11, 0xad, 0xb8, 0xb4, + 0x79, 0x87, 0x75, 0x49, 0x84, 0x69, 0x5c, 0xac, 0x0e, 0x8f, 0x14, 0xb3, + 0x36, 0x08, 0x28, 0xa2, 0x2f, 0xfa, 0x27, 0x11, 0x0a, 0x3d, 0x62, 0xa9, + 0x93, 0x45, 0x34, 0x09, 0xa0, 0xfe, 0x69, 0x6c, 0x46, 0x58, 0xf8, 0x4b, + 0xdd, 0x20, 0x81, 0x9c, 0x37, 0x09, 0xa0, 0x10, 0x57, 0xb1, 0x95, 0xad, + 0xcd, 0x00, 0x23, 0x3d, 0xba, 0x54, 0x84, 0xb6, 0x29, 0x1f, 0x9d, 0x64, + 0x8e, 0xf8, 0x83, 0x44, 0x86, 0x77, 0x97, 0x9c, 0xec, 0x04, 0xb4, 0x34, + 0xa6, 0xac, 0x2e, 0x75, 0xe9, 0x98, 0x5d, 0xe2, 0x3d, 0xb0, 0x29, 0x2f, + 0xc1, 0x11, 0x8c, 0x9f, 0xfa, 0x9d, 0x81, 0x81, 0xe7, 0x33, 0x8d, 0xb7, + 0x92, 0xb7, 0x30, 0xd7, 0xb9, 0xe3, 0x49, 0x59, 0x2f, 0x68, 0x09, 0x98, + 0x72, 0x15, 0x39, 0x15, 0xea, 0x3d, 0x6b, 0x8b, 0x46, 0x53, 0xc6, 0x33, + 0x45, 0x8f, 0x80, 0x3b, 0x32, 0xa4, 0xc2, 0xe0, 0xf2, 0x72, 0x90, 0x25, + 0x6e, 0x4e, 0x3f, 0x8a, 0x3b, 0x08, 0x38, 0xa1, 0xc4, 0x50, 0xe4, 0xe1, + 0x8c, 0x1a, 0x29, 0xa3, 0x7d, 0xdf, 0x5e, 0xa1, 0x43, 0xde, 0x4b, 0x66, + 0xff, 0x04, 0x90, 0x3e, 0xd5, 0xcf, 0x16, 0x23, 0xe1, 0x58, 0xd4, 0x87, + 0xc6, 0x08, 0xe9, 0x7f, 0x21, 0x1c, 0xd8, 0x1d, 0xca, 0x23, 0xcb, 0x6e, + 0x38, 0x07, 0x65, 0xf8, 0x22, 0xe3, 0x42, 0xbe, 0x48, 0x4c, 0x05, 0x76, + 0x39, 0x39, 0x60, 0x1c, 0xd6, 0x67, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, + 0xa6, 0x85, 0x78, 0xf7, 0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, + 0x85, 0xef, 0x32, 0xb2, 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, + 0x5d, 0x02, 0x82, 0x01, 0x00, 0x16, 0xa6, 0x5c, 0x58, 0x20, 0x48, 0x50, + 0x70, 0x4e, 0x75, 0x02, 0xa3, 0x97, 0x57, 0x04, 0x0d, 0x34, 0xda, 0x3a, + 0x34, 0x78, 0xc1, 0x54, 0xd4, 0xe4, 0xa5, 0xc0, 0x2d, 0x24, 0x2e, 0xe0, + 0x4f, 0x96, 0xe6, 0x1e, 0x4b, 0xd0, 0x90, 0x4a, 0xbd, 0xac, 0x8f, 0x37, + 0xee, 0xb1, 0xe0, 0x9f, 0x31, 0x82, 0xd2, 0x3c, 0x90, 0x43, 0xcb, 0x64, + 0x2f, 0x88, 0x00, 0x41, 0x60, 0xed, 0xf9, 0xca, 0x09, 0xb3, 0x20, 0x76, + 0xa7, 0x9c, 0x32, 0xa6, 0x27, 0xf2, 0x47, 0x3e, 0x91, 0x87, 0x9b, 0xa2, + 0xc4, 0xe7, 0x44, 0xbd, 0x20, 0x81, 0x54, 0x4c, 0xb5, 0x5b, 0x80, 0x2c, + 0x36, 0x8d, 0x1f, 0xa8, 0x3e, 0xd4, 0x89, 0xe9, 0x4e, 0x0f, 0xa0, 0x68, + 0x8e, 0x32, 0x42, 0x8a, 0x5c, 0x78, 0xc4, 0x78, 0xc6, 0x8d, 0x05, 0x27, + 0xb7, 0x1c, 0x9a, 0x3a, 0xbb, 0x0b, 0x0b, 0xe1, 0x2c, 0x44, 0x68, 0x96, + 0x39, 0xe7, 0xd3, 0xce, 0x74, 0xdb, 0x10, 0x1a, 0x65, 0xaa, 0x2b, 0x87, + 0xf6, 0x4c, 0x68, 0x26, 0xdb, 0x3e, 0xc7, 0x2f, 0x4b, 0x55, 0x99, 0x83, + 0x4b, 0xb4, 0xed, 0xb0, 0x2f, 0x7c, 0x90, 0xe9, 0xa4, 0x96, 0xd3, 0xa5, + 0x5d, 0x53, 0x5b, 0xeb, 0xfc, 0x45, 0xd4, 0xf6, 0x19, 0xf6, 0x3f, 0x3d, + 0xed, 0xbb, 0x87, 0x39, 0x25, 0xc2, 0xf2, 0x24, 0xe0, 0x77, 0x31, 0x29, + 0x6d, 0xa8, 0x87, 0xec, 0x1e, 0x47, 0x48, 0xf8, 0x7e, 0xfb, 0x5f, 0xde, + 0xb7, 0x54, 0x84, 0x31, 0x6b, 0x22, 0x32, 0xde, 0xe5, 0x53, 0xdd, 0xaf, + 0x02, 0x11, 0x2b, 0x0d, 0x1f, 0x02, 0xda, 0x30, 0x97, 0x32, 0x24, 0xfe, + 0x27, 0xae, 0xda, 0x8b, 0x9d, 0x4b, 0x29, 0x22, 0xd9, 0xba, 0x8b, 0xe3, + 0x9e, 0xd9, 0xe1, 0x03, 0xa6, 0x3c, 0x52, 0x81, 0x0b, 0xc6, 0x88, 0xb7, + 0xe2, 0xed, 0x43, 0x16, 0xe1, 0xef, 0x17, 0xdb, 0xde, 0x03, 0x82, 0x01, + 0x06, 0x00, 0x02, 0x82, 0x01, 0x01, 0x00, 0x84, 0x81, 0x77, 0xb9, 0xbc, + 0xff, 0x13, 0x6c, 0x52, 0xca, 0xef, 0x2a, 0x4a, 0x9b, 0xcb, 0x64, 0xdb, + 0xef, 0xba, 0xc6, 0x9e, 0x18, 0xaa, 0xe4, 0x99, 0x69, 0x6b, 0x5e, 0xc7, + 0xb2, 0x70, 0xe9, 0x04, 0x78, 0xb4, 0x13, 0xbb, 0x8a, 0xd8, 0xf8, 0xee, + 0xe8, 0xad, 0x32, 0x10, 0x7d, 0x7b, 0xa4, 0x92, 0xc3, 0x6b, 0x00, 0x7f, + 0x9e, 0xf3, 0x0e, 0xbe, 0x1e, 0xe4, 0x84, 0xd0, 0xea, 0x7c, 0xb0, 0xff, + 0x4a, 0xfa, 0xa8, 0xc7, 0x05, 0xad, 0x5e, 0x16, 0x57, 0x69, 0x75, 0x41, + 0x4f, 0x1b, 0xc0, 0xef, 0xed, 0x25, 0xc2, 0x19, 0x0a, 0x3e, 0xd0, 0x06, + 0x8b, 0xff, 0xa1, 0xf0, 0x3b, 0xf6, 0xf2, 0x10, 0x56, 0xc9, 0xbb, 0x38, + 0x33, 0x50, 0x85, 0x19, 0x97, 0xcb, 0xc8, 0x9c, 0xf8, 0x72, 0x9b, 0x39, + 0x45, 0x27, 0xf0, 0x8a, 0xb9, 0x3c, 0xe9, 0xb3, 0x60, 0xaa, 0x05, 0x5a, + 0x47, 0x17, 0x7e, 0x82, 0xa4, 0xce, 0x6f, 0xe7, 0x6c, 0x8d, 0xff, 0xdd, + 0xbd, 0x6e, 0xe2, 0x0f, 0xa0, 0x8d, 0x00, 0x85, 0xd3, 0x98, 0x3e, 0xdd, + 0x2c, 0x8d, 0x9a, 0x36, 0x6a, 0xd2, 0x24, 0x5b, 0x4e, 0xd2, 0x8d, 0x67, + 0x54, 0x76, 0x9f, 0x5f, 0x3a, 0x79, 0x8b, 0xe4, 0xbe, 0x19, 0xcf, 0x46, + 0x93, 0x99, 0x86, 0x5d, 0x46, 0x4e, 0x3f, 0x64, 0x04, 0x38, 0xbc, 0xe0, + 0x3c, 0x96, 0x2c, 0x23, 0x44, 0xd0, 0xd5, 0x50, 0x54, 0x2a, 0xed, 0x3d, + 0xb5, 0x5c, 0x15, 0x38, 0x33, 0xbe, 0xa4, 0x4b, 0x41, 0x46, 0x87, 0x8b, + 0xa3, 0x47, 0xc8, 0x61, 0x44, 0x36, 0xc6, 0xaa, 0xc4, 0xfd, 0x1a, 0x60, + 0xf2, 0x5c, 0x62, 0xb3, 0xf8, 0x69, 0xa7, 0xd5, 0x5c, 0xab, 0x4b, 0x71, + 0x22, 0xd5, 0xe9, 0xaf, 0x43, 0x22, 0xa3, 0xfc, 0x82, 0x14, 0xfa, 0x55, + 0xdc, 0x1e, 0xe0, 0x21, 0x45, 0x9f, 0xb2, 0xc4, 0x59, 0x58, 0x27}; + +static const std::vector<uint8_t> kPubKey7{ + 0x30, 0x82, 0x03, 0x42, 0x30, 0x82, 0x02, 0x35, 0x06, 0x07, 0x2a, 0x86, + 0x48, 0xce, 0x38, 0x04, 0x01, 0x30, 0x82, 0x02, 0x28, 0x02, 0x82, 0x01, + 0x01, 0x00, 0x8f, 0x79, 0x35, 0xd9, 0xb9, 0xaa, 0xe9, 0xbf, 0xab, 0xed, + 0x88, 0x7a, 0xcf, 0x49, 0x51, 0xb6, 0xf3, 0x2e, 0xc5, 0x9e, 0x3b, 0xaf, + 0x37, 0x18, 0xe8, 0xea, 0xc4, 0x96, 0x1f, 0x3e, 0xfd, 0x36, 0x06, 0xe7, + 0x43, 0x51, 0xa9, 0xc4, 0x18, 0x33, 0x39, 0xb8, 0x09, 0xe7, 0xc2, 0xae, + 0x1c, 0x53, 0x9b, 0xa7, 0x47, 0x5b, 0x85, 0xd0, 0x11, 0xad, 0xb8, 0xb4, + 0x79, 0x87, 0x75, 0x49, 0x84, 0x69, 0x5c, 0xac, 0x0e, 0x8f, 0x14, 0xb3, + 0x36, 0x08, 0x28, 0xa2, 0x2f, 0xfa, 0x27, 0x11, 0x0a, 0x3d, 0x62, 0xa9, + 0x93, 0x45, 0x34, 0x09, 0xa0, 0xfe, 0x69, 0x6c, 0x46, 0x58, 0xf8, 0x4b, + 0xdd, 0x20, 0x81, 0x9c, 0x37, 0x09, 0xa0, 0x10, 0x57, 0xb1, 0x95, 0xad, + 0xcd, 0x00, 0x23, 0x3d, 0xba, 0x54, 0x84, 0xb6, 0x29, 0x1f, 0x9d, 0x64, + 0x8e, 0xf8, 0x83, 0x44, 0x86, 0x77, 0x97, 0x9c, 0xec, 0x04, 0xb4, 0x34, + 0xa6, 0xac, 0x2e, 0x75, 0xe9, 0x98, 0x5d, 0xe2, 0x3d, 0xb0, 0x29, 0x2f, + 0xc1, 0x11, 0x8c, 0x9f, 0xfa, 0x9d, 0x81, 0x81, 0xe7, 0x33, 0x8d, 0xb7, + 0x92, 0xb7, 0x30, 0xd7, 0xb9, 0xe3, 0x49, 0x59, 0x2f, 0x68, 0x09, 0x98, + 0x72, 0x15, 0x39, 0x15, 0xea, 0x3d, 0x6b, 0x8b, 0x46, 0x53, 0xc6, 0x33, + 0x45, 0x8f, 0x80, 0x3b, 0x32, 0xa4, 0xc2, 0xe0, 0xf2, 0x72, 0x90, 0x25, + 0x6e, 0x4e, 0x3f, 0x8a, 0x3b, 0x08, 0x38, 0xa1, 0xc4, 0x50, 0xe4, 0xe1, + 0x8c, 0x1a, 0x29, 0xa3, 0x7d, 0xdf, 0x5e, 0xa1, 0x43, 0xde, 0x4b, 0x66, + 0xff, 0x04, 0x90, 0x3e, 0xd5, 0xcf, 0x16, 0x23, 0xe1, 0x58, 0xd4, 0x87, + 0xc6, 0x08, 0xe9, 0x7f, 0x21, 0x1c, 0xd8, 0x1d, 0xca, 0x23, 0xcb, 0x6e, + 0x38, 0x07, 0x65, 0xf8, 0x22, 0xe3, 0x42, 0xbe, 0x48, 0x4c, 0x05, 0x76, + 0x39, 0x39, 0x60, 0x1c, 0xd6, 0x67, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, + 0xa6, 0x85, 0x78, 0xf7, 0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, + 0x85, 0xef, 0x32, 0xb2, 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, + 0x5d, 0x02, 0x82, 0x01, 0x00, 0x16, 0xa6, 0x5c, 0x58, 0x20, 0x48, 0x50, + 0x70, 0x4e, 0x75, 0x02, 0xa3, 0x97, 0x57, 0x04, 0x0d, 0x34, 0xda, 0x3a, + 0x34, 0x78, 0xc1, 0x54, 0xd4, 0xe4, 0xa5, 0xc0, 0x2d, 0x24, 0x2e, 0xe0, + 0x4f, 0x96, 0xe6, 0x1e, 0x4b, 0xd0, 0x90, 0x4a, 0xbd, 0xac, 0x8f, 0x37, + 0xee, 0xb1, 0xe0, 0x9f, 0x31, 0x82, 0xd2, 0x3c, 0x90, 0x43, 0xcb, 0x64, + 0x2f, 0x88, 0x00, 0x41, 0x60, 0xed, 0xf9, 0xca, 0x09, 0xb3, 0x20, 0x76, + 0xa7, 0x9c, 0x32, 0xa6, 0x27, 0xf2, 0x47, 0x3e, 0x91, 0x87, 0x9b, 0xa2, + 0xc4, 0xe7, 0x44, 0xbd, 0x20, 0x81, 0x54, 0x4c, 0xb5, 0x5b, 0x80, 0x2c, + 0x36, 0x8d, 0x1f, 0xa8, 0x3e, 0xd4, 0x89, 0xe9, 0x4e, 0x0f, 0xa0, 0x68, + 0x8e, 0x32, 0x42, 0x8a, 0x5c, 0x78, 0xc4, 0x78, 0xc6, 0x8d, 0x05, 0x27, + 0xb7, 0x1c, 0x9a, 0x3a, 0xbb, 0x0b, 0x0b, 0xe1, 0x2c, 0x44, 0x68, 0x96, + 0x39, 0xe7, 0xd3, 0xce, 0x74, 0xdb, 0x10, 0x1a, 0x65, 0xaa, 0x2b, 0x87, + 0xf6, 0x4c, 0x68, 0x26, 0xdb, 0x3e, 0xc7, 0x2f, 0x4b, 0x55, 0x99, 0x83, + 0x4b, 0xb4, 0xed, 0xb0, 0x2f, 0x7c, 0x90, 0xe9, 0xa4, 0x96, 0xd3, 0xa5, + 0x5d, 0x53, 0x5b, 0xeb, 0xfc, 0x45, 0xd4, 0xf6, 0x19, 0xf6, 0x3f, 0x3d, + 0xed, 0xbb, 0x87, 0x39, 0x25, 0xc2, 0xf2, 0x24, 0xe0, 0x77, 0x31, 0x29, + 0x6d, 0xa8, 0x87, 0xec, 0x1e, 0x47, 0x48, 0xf8, 0x7e, 0xfb, 0x5f, 0xde, + 0xb7, 0x54, 0x84, 0x31, 0x6b, 0x22, 0x32, 0xde, 0xe5, 0x53, 0xdd, 0xaf, + 0x02, 0x11, 0x2b, 0x0d, 0x1f, 0x02, 0xda, 0x30, 0x97, 0x32, 0x24, 0xfe, + 0x27, 0xae, 0xda, 0x8b, 0x9d, 0x4b, 0x29, 0x22, 0xd9, 0xba, 0x8b, 0xe3, + 0x9e, 0xd9, 0xe1, 0x03, 0xa6, 0x3c, 0x52, 0x81, 0x0b, 0xc6, 0x88, 0xb7, + 0xe2, 0xed, 0x43, 0x16, 0xe1, 0xef, 0x17, 0xdb, 0xde, 0x03, 0x82, 0x01, + 0x05, 0x00, 0x02, 0x82, 0x01, 0x00, 0x62, 0x93, 0x74, 0x92, 0x95, 0x37, + 0xe2, 0xc3, 0xb0, 0x9f, 0x30, 0xd8, 0x81, 0x55, 0x4c, 0xa7, 0x35, 0x7f, + 0x89, 0xe2, 0x51, 0x05, 0x47, 0x4d, 0xbb, 0xce, 0x06, 0xe4, 0x00, 0x1e, + 0xfd, 0x61, 0x48, 0x1a, 0x45, 0x7a, 0xa0, 0xd7, 0xd7, 0xe5, 0x65, 0xe9, + 0x0b, 0x7a, 0x3d, 0x9c, 0x68, 0x80, 0x05, 0xfb, 0x40, 0x4b, 0xf3, 0xb6, + 0xd3, 0xe6, 0x1e, 0x40, 0x23, 0x00, 0xbe, 0xee, 0x7c, 0x58, 0xce, 0xea, + 0xf0, 0x0b, 0x11, 0x2d, 0xdf, 0xee, 0xf3, 0xcb, 0xc2, 0x02, 0x0b, 0xa2, + 0x20, 0x6d, 0xd4, 0xef, 0x05, 0x63, 0xd7, 0xfa, 0x52, 0xc3, 0x21, 0xb4, + 0xee, 0x62, 0x80, 0xeb, 0x85, 0x85, 0x04, 0x1d, 0x03, 0xca, 0xdb, 0x92, + 0x44, 0xdf, 0xf2, 0x1d, 0xc9, 0x04, 0x17, 0xbb, 0xe6, 0xf0, 0x6b, 0x91, + 0xc2, 0xca, 0x64, 0x84, 0x43, 0x7c, 0x38, 0x46, 0x92, 0x6b, 0x18, 0xee, + 0x22, 0x27, 0x50, 0x81, 0xb6, 0x07, 0x26, 0xe7, 0xa2, 0x6a, 0x29, 0xa9, + 0x47, 0xea, 0xbd, 0x03, 0x5e, 0xde, 0x83, 0xd6, 0x59, 0x27, 0xb3, 0xce, + 0xb0, 0xd4, 0xd8, 0xc2, 0xf3, 0x4e, 0x94, 0xa3, 0xde, 0x0f, 0x57, 0xe4, + 0xea, 0x99, 0xaf, 0x05, 0x96, 0x57, 0x52, 0x9f, 0x69, 0x54, 0xb1, 0xac, + 0x9b, 0xb4, 0x48, 0x4c, 0xa7, 0x6b, 0x40, 0x83, 0xe1, 0xcf, 0x42, 0x64, + 0xef, 0xf0, 0x28, 0x66, 0x21, 0x37, 0x76, 0x1e, 0x4d, 0x7f, 0x35, 0xb1, + 0xed, 0xa3, 0xcf, 0x51, 0x68, 0x56, 0xf2, 0x55, 0x53, 0x84, 0x0e, 0x43, + 0xae, 0x38, 0x37, 0x9d, 0x23, 0x4b, 0x06, 0xc8, 0x91, 0x82, 0x21, 0x32, + 0x08, 0x1d, 0x19, 0xf0, 0xd5, 0xdb, 0x9f, 0x23, 0xb4, 0xbb, 0xd5, 0xf5, + 0x66, 0x7d, 0xd7, 0x8f, 0x3d, 0xd7, 0xf1, 0xfe, 0x5f, 0x25, 0xca, 0x48, + 0x51, 0x5f, 0x63, 0x35, 0xce, 0x1c, 0x9f, 0xd0, 0xa6, 0x4b}; + +const DsaTestVector kDsaWycheproofVectors[] = { + + // Comment: Legacy:ASN encoding of r misses leading 0 + // tcID: 1 + {SEC_OID_SHA1, + 1, + {0x30, 0x2c, 0x02, 0x14, 0xaa, 0x6a, 0x25, 0x8f, 0xbf, 0x7d, 0x90, 0xe1, + 0x56, 0x14, 0x67, 0x6d, 0x37, 0x7d, 0xf8, 0xb1, 0x0e, 0x38, 0xdb, 0x4a, + 0x02, 0x14, 0x49, 0x6d, 0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32, 0xd1, + 0xf9, 0x91, 0x20, 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + true}, + + // Comment: valid + // tcID: 2 + {SEC_OID_SHA1, + 2, + {0x30, 0x2d, 0x02, 0x15, 0x00, 0xaa, 0x6a, 0x25, 0x8f, 0xbf, 0x7d, 0x90, + 0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37, 0x7d, 0xf8, 0xb1, 0x0e, 0x38, 0xdb, + 0x4a, 0x02, 0x14, 0x49, 0x6d, 0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32, + 0xd1, 0xf9, 0x91, 0x20, 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + true}, + + // Comment: long form encoding of length of sequence + // tcID: 3 + {SEC_OID_SHA1, + 3, + {0x30, 0x81, 0x2d, 0x02, 0x15, 0x00, 0xaa, 0x6a, 0x25, 0x8f, 0xbf, 0x7d, + 0x90, 0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37, 0x7d, 0xf8, 0xb1, 0x0e, 0x38, + 0xdb, 0x4a, 0x02, 0x14, 0x49, 0x6d, 0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35, + 0x32, 0xd1, 0xf9, 0x91, 0x20, 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: length of sequence contains leading 0 + // tcID: 4 + {SEC_OID_SHA1, + 4, + {0x30, 0x82, 0x00, 0x2d, 0x02, 0x15, 0x00, 0xaa, 0x6a, 0x25, + 0x8f, 0xbf, 0x7d, 0x90, 0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37, + 0x7d, 0xf8, 0xb1, 0x0e, 0x38, 0xdb, 0x4a, 0x02, 0x14, 0x49, + 0x6d, 0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32, 0xd1, 0xf9, + 0x91, 0x20, 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: wrong length of sequence + // tcID: 5 + {SEC_OID_SHA1, + 5, + {0x30, 0x2e, 0x02, 0x15, 0x00, 0xaa, 0x6a, 0x25, 0x8f, 0xbf, 0x7d, 0x90, + 0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37, 0x7d, 0xf8, 0xb1, 0x0e, 0x38, 0xdb, + 0x4a, 0x02, 0x14, 0x49, 0x6d, 0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32, + 0xd1, 0xf9, 0x91, 0x20, 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: wrong length of sequence + // tcID: 6 + {SEC_OID_SHA1, + 6, + {0x30, 0x2c, 0x02, 0x15, 0x00, 0xaa, 0x6a, 0x25, 0x8f, 0xbf, 0x7d, 0x90, + 0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37, 0x7d, 0xf8, 0xb1, 0x0e, 0x38, 0xdb, + 0x4a, 0x02, 0x14, 0x49, 0x6d, 0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32, + 0xd1, 0xf9, 0x91, 0x20, 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: uint32 overflow in length of sequence + // tcID: 7 + {SEC_OID_SHA1, + 7, + {0x30, 0x85, 0x01, 0x00, 0x00, 0x00, 0x2d, 0x02, 0x15, 0x00, 0xaa, + 0x6a, 0x25, 0x8f, 0xbf, 0x7d, 0x90, 0xe1, 0x56, 0x14, 0x67, 0x6d, + 0x37, 0x7d, 0xf8, 0xb1, 0x0e, 0x38, 0xdb, 0x4a, 0x02, 0x14, 0x49, + 0x6d, 0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32, 0xd1, 0xf9, 0x91, + 0x20, 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: uint64 overflow in length of sequence + // tcID: 8 + {SEC_OID_SHA1, + 8, + {0x30, 0x89, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x2d, 0x02, + 0x15, 0x00, 0xaa, 0x6a, 0x25, 0x8f, 0xbf, 0x7d, 0x90, 0xe1, 0x56, 0x14, + 0x67, 0x6d, 0x37, 0x7d, 0xf8, 0xb1, 0x0e, 0x38, 0xdb, 0x4a, 0x02, 0x14, + 0x49, 0x6d, 0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32, 0xd1, 0xf9, 0x91, + 0x20, 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: length of sequence = 2**31 - 1 + // tcID: 9 + {SEC_OID_SHA1, + 9, + {0x30, 0x84, 0x7f, 0xff, 0xff, 0xff, 0x02, 0x15, 0x00, 0xaa, 0x6a, + 0x25, 0x8f, 0xbf, 0x7d, 0x90, 0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37, + 0x7d, 0xf8, 0xb1, 0x0e, 0x38, 0xdb, 0x4a, 0x02, 0x14, 0x49, 0x6d, + 0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32, 0xd1, 0xf9, 0x91, 0x20, + 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: length of sequence = 2**32 - 1 + // tcID: 10 + {SEC_OID_SHA1, + 10, + {0x30, 0x84, 0xff, 0xff, 0xff, 0xff, 0x02, 0x15, 0x00, 0xaa, 0x6a, + 0x25, 0x8f, 0xbf, 0x7d, 0x90, 0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37, + 0x7d, 0xf8, 0xb1, 0x0e, 0x38, 0xdb, 0x4a, 0x02, 0x14, 0x49, 0x6d, + 0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32, 0xd1, 0xf9, 0x91, 0x20, + 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: length of sequence = 2**40 - 1 + // tcID: 11 + {SEC_OID_SHA1, + 11, + {0x30, 0x85, 0xff, 0xff, 0xff, 0xff, 0xff, 0x02, 0x15, 0x00, 0xaa, + 0x6a, 0x25, 0x8f, 0xbf, 0x7d, 0x90, 0xe1, 0x56, 0x14, 0x67, 0x6d, + 0x37, 0x7d, 0xf8, 0xb1, 0x0e, 0x38, 0xdb, 0x4a, 0x02, 0x14, 0x49, + 0x6d, 0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32, 0xd1, 0xf9, 0x91, + 0x20, 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: length of sequence = 2**64 - 1 + // tcID: 12 + {SEC_OID_SHA1, + 12, + {0x30, 0x88, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x02, + 0x15, 0x00, 0xaa, 0x6a, 0x25, 0x8f, 0xbf, 0x7d, 0x90, 0xe1, 0x56, + 0x14, 0x67, 0x6d, 0x37, 0x7d, 0xf8, 0xb1, 0x0e, 0x38, 0xdb, 0x4a, + 0x02, 0x14, 0x49, 0x6d, 0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32, + 0xd1, 0xf9, 0x91, 0x20, 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: incorrect length of sequence + // tcID: 13 + {SEC_OID_SHA1, + 13, + {0x30, 0xff, 0x02, 0x15, 0x00, 0xaa, 0x6a, 0x25, 0x8f, 0xbf, 0x7d, 0x90, + 0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37, 0x7d, 0xf8, 0xb1, 0x0e, 0x38, 0xdb, + 0x4a, 0x02, 0x14, 0x49, 0x6d, 0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32, + 0xd1, 0xf9, 0x91, 0x20, 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: indefinite length without termination + // tcID: 14 + {SEC_OID_SHA1, + 14, + {0x30, 0x80, 0x02, 0x15, 0x00, 0xaa, 0x6a, 0x25, 0x8f, 0xbf, 0x7d, 0x90, + 0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37, 0x7d, 0xf8, 0xb1, 0x0e, 0x38, 0xdb, + 0x4a, 0x02, 0x14, 0x49, 0x6d, 0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32, + 0xd1, 0xf9, 0x91, 0x20, 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: indefinite length without termination + // tcID: 15 + {SEC_OID_SHA1, + 15, + {0x30, 0x2d, 0x02, 0x80, 0x00, 0xaa, 0x6a, 0x25, 0x8f, 0xbf, 0x7d, 0x90, + 0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37, 0x7d, 0xf8, 0xb1, 0x0e, 0x38, 0xdb, + 0x4a, 0x02, 0x14, 0x49, 0x6d, 0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32, + 0xd1, 0xf9, 0x91, 0x20, 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: indefinite length without termination + // tcID: 16 + {SEC_OID_SHA1, + 16, + {0x30, 0x2d, 0x02, 0x15, 0x00, 0xaa, 0x6a, 0x25, 0x8f, 0xbf, 0x7d, 0x90, + 0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37, 0x7d, 0xf8, 0xb1, 0x0e, 0x38, 0xdb, + 0x4a, 0x02, 0x80, 0x49, 0x6d, 0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32, + 0xd1, 0xf9, 0x91, 0x20, 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: removing sequence + // tcID: 17 + {SEC_OID_SHA1, + 17, + {}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: lonely sequence tag + // tcID: 18 + {SEC_OID_SHA1, + 18, + {0x30}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: appending 0's to sequence + // tcID: 19 + {SEC_OID_SHA1, + 19, + {0x30, 0x2f, 0x02, 0x15, 0x00, 0xaa, 0x6a, 0x25, 0x8f, 0xbf, + 0x7d, 0x90, 0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37, 0x7d, 0xf8, + 0xb1, 0x0e, 0x38, 0xdb, 0x4a, 0x02, 0x14, 0x49, 0x6d, 0x52, + 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32, 0xd1, 0xf9, 0x91, 0x20, + 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b, 0x00, 0x00}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: prepending 0's to sequence + // tcID: 20 + {SEC_OID_SHA1, + 20, + {0x30, 0x2f, 0x00, 0x00, 0x02, 0x15, 0x00, 0xaa, 0x6a, 0x25, + 0x8f, 0xbf, 0x7d, 0x90, 0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37, + 0x7d, 0xf8, 0xb1, 0x0e, 0x38, 0xdb, 0x4a, 0x02, 0x14, 0x49, + 0x6d, 0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32, 0xd1, 0xf9, + 0x91, 0x20, 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: appending unused 0's to sequence + // tcID: 21 + {SEC_OID_SHA1, + 21, + {0x30, 0x2d, 0x02, 0x15, 0x00, 0xaa, 0x6a, 0x25, 0x8f, 0xbf, + 0x7d, 0x90, 0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37, 0x7d, 0xf8, + 0xb1, 0x0e, 0x38, 0xdb, 0x4a, 0x02, 0x14, 0x49, 0x6d, 0x52, + 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32, 0xd1, 0xf9, 0x91, 0x20, + 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b, 0x00, 0x00}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: appending null value to sequence + // tcID: 22 + {SEC_OID_SHA1, + 22, + {0x30, 0x2f, 0x02, 0x15, 0x00, 0xaa, 0x6a, 0x25, 0x8f, 0xbf, + 0x7d, 0x90, 0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37, 0x7d, 0xf8, + 0xb1, 0x0e, 0x38, 0xdb, 0x4a, 0x02, 0x14, 0x49, 0x6d, 0x52, + 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32, 0xd1, 0xf9, 0x91, 0x20, + 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b, 0x05, 0x00}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: including garbage + // tcID: 23 + {SEC_OID_SHA1, + 23, + {0x30, 0x32, 0x49, 0x81, 0x77, 0x30, 0x2d, 0x02, 0x15, 0x00, 0xaa, + 0x6a, 0x25, 0x8f, 0xbf, 0x7d, 0x90, 0xe1, 0x56, 0x14, 0x67, 0x6d, + 0x37, 0x7d, 0xf8, 0xb1, 0x0e, 0x38, 0xdb, 0x4a, 0x02, 0x14, 0x49, + 0x6d, 0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32, 0xd1, 0xf9, 0x91, + 0x20, 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: including garbage + // tcID: 24 + {SEC_OID_SHA1, + 24, + {0x30, 0x31, 0x25, 0x00, 0x30, 0x2d, 0x02, 0x15, 0x00, 0xaa, 0x6a, + 0x25, 0x8f, 0xbf, 0x7d, 0x90, 0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37, + 0x7d, 0xf8, 0xb1, 0x0e, 0x38, 0xdb, 0x4a, 0x02, 0x14, 0x49, 0x6d, + 0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32, 0xd1, 0xf9, 0x91, 0x20, + 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: including garbage + // tcID: 25 + {SEC_OID_SHA1, + 25, + {0x30, 0x2f, 0x30, 0x2d, 0x02, 0x15, 0x00, 0xaa, 0x6a, 0x25, 0x8f, + 0xbf, 0x7d, 0x90, 0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37, 0x7d, 0xf8, + 0xb1, 0x0e, 0x38, 0xdb, 0x4a, 0x02, 0x14, 0x49, 0x6d, 0x52, 0x20, + 0xb5, 0xf6, 0x7d, 0x35, 0x32, 0xd1, 0xf9, 0x91, 0x20, 0x3b, 0xc3, + 0x52, 0x3b, 0x96, 0x4c, 0x3b, 0x00, 0x04, 0xde, 0xad, 0xbe, 0xef}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: including garbage + // tcID: 26 + {SEC_OID_SHA1, + 26, + {0x30, 0x32, 0x22, 0x1a, 0x49, 0x81, 0x77, 0x02, 0x15, 0x00, 0xaa, + 0x6a, 0x25, 0x8f, 0xbf, 0x7d, 0x90, 0xe1, 0x56, 0x14, 0x67, 0x6d, + 0x37, 0x7d, 0xf8, 0xb1, 0x0e, 0x38, 0xdb, 0x4a, 0x02, 0x14, 0x49, + 0x6d, 0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32, 0xd1, 0xf9, 0x91, + 0x20, 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: including garbage + // tcID: 27 + {SEC_OID_SHA1, + 27, + {0x30, 0x31, 0x22, 0x19, 0x25, 0x00, 0x02, 0x15, 0x00, 0xaa, 0x6a, + 0x25, 0x8f, 0xbf, 0x7d, 0x90, 0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37, + 0x7d, 0xf8, 0xb1, 0x0e, 0x38, 0xdb, 0x4a, 0x02, 0x14, 0x49, 0x6d, + 0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32, 0xd1, 0xf9, 0x91, 0x20, + 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: including garbage + // tcID: 28 + {SEC_OID_SHA1, + 28, + {0x30, 0x35, 0x22, 0x17, 0x02, 0x15, 0x00, 0xaa, 0x6a, 0x25, 0x8f, + 0xbf, 0x7d, 0x90, 0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37, 0x7d, 0xf8, + 0xb1, 0x0e, 0x38, 0xdb, 0x4a, 0x00, 0x04, 0xde, 0xad, 0xbe, 0xef, + 0x02, 0x14, 0x49, 0x6d, 0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32, + 0xd1, 0xf9, 0x91, 0x20, 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: including garbage + // tcID: 29 + {SEC_OID_SHA1, + 29, + {0x30, 0x32, 0x02, 0x15, 0x00, 0xaa, 0x6a, 0x25, 0x8f, 0xbf, 0x7d, + 0x90, 0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37, 0x7d, 0xf8, 0xb1, 0x0e, + 0x38, 0xdb, 0x4a, 0x22, 0x19, 0x49, 0x81, 0x77, 0x02, 0x14, 0x49, + 0x6d, 0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32, 0xd1, 0xf9, 0x91, + 0x20, 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: including garbage + // tcID: 30 + {SEC_OID_SHA1, + 30, + {0x30, 0x31, 0x02, 0x15, 0x00, 0xaa, 0x6a, 0x25, 0x8f, 0xbf, 0x7d, + 0x90, 0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37, 0x7d, 0xf8, 0xb1, 0x0e, + 0x38, 0xdb, 0x4a, 0x22, 0x18, 0x25, 0x00, 0x02, 0x14, 0x49, 0x6d, + 0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32, 0xd1, 0xf9, 0x91, 0x20, + 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: including garbage + // tcID: 31 + {SEC_OID_SHA1, + 31, + {0x30, 0x35, 0x02, 0x15, 0x00, 0xaa, 0x6a, 0x25, 0x8f, 0xbf, 0x7d, + 0x90, 0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37, 0x7d, 0xf8, 0xb1, 0x0e, + 0x38, 0xdb, 0x4a, 0x22, 0x16, 0x02, 0x14, 0x49, 0x6d, 0x52, 0x20, + 0xb5, 0xf6, 0x7d, 0x35, 0x32, 0xd1, 0xf9, 0x91, 0x20, 0x3b, 0xc3, + 0x52, 0x3b, 0x96, 0x4c, 0x3b, 0x00, 0x04, 0xde, 0xad, 0xbe, 0xef}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: including undefined tags + // tcID: 32 + {SEC_OID_SHA1, + 32, + {0x30, 0x35, 0xaa, 0x00, 0xbb, 0x00, 0xcd, 0x00, 0x30, 0x2d, 0x02, + 0x15, 0x00, 0xaa, 0x6a, 0x25, 0x8f, 0xbf, 0x7d, 0x90, 0xe1, 0x56, + 0x14, 0x67, 0x6d, 0x37, 0x7d, 0xf8, 0xb1, 0x0e, 0x38, 0xdb, 0x4a, + 0x02, 0x14, 0x49, 0x6d, 0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32, + 0xd1, 0xf9, 0x91, 0x20, 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: including undefined tags + // tcID: 33 + {SEC_OID_SHA1, + 33, + {0x30, 0x33, 0xaa, 0x02, 0xaa, 0xbb, 0x30, 0x2d, 0x02, 0x15, 0x00, + 0xaa, 0x6a, 0x25, 0x8f, 0xbf, 0x7d, 0x90, 0xe1, 0x56, 0x14, 0x67, + 0x6d, 0x37, 0x7d, 0xf8, 0xb1, 0x0e, 0x38, 0xdb, 0x4a, 0x02, 0x14, + 0x49, 0x6d, 0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32, 0xd1, 0xf9, + 0x91, 0x20, 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: including undefined tags + // tcID: 34 + {SEC_OID_SHA1, + 34, + {0x30, 0x35, 0x22, 0x1d, 0xaa, 0x00, 0xbb, 0x00, 0xcd, 0x00, 0x02, + 0x15, 0x00, 0xaa, 0x6a, 0x25, 0x8f, 0xbf, 0x7d, 0x90, 0xe1, 0x56, + 0x14, 0x67, 0x6d, 0x37, 0x7d, 0xf8, 0xb1, 0x0e, 0x38, 0xdb, 0x4a, + 0x02, 0x14, 0x49, 0x6d, 0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32, + 0xd1, 0xf9, 0x91, 0x20, 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: including undefined tags + // tcID: 35 + {SEC_OID_SHA1, + 35, + {0x30, 0x33, 0x22, 0x1b, 0xaa, 0x02, 0xaa, 0xbb, 0x02, 0x15, 0x00, + 0xaa, 0x6a, 0x25, 0x8f, 0xbf, 0x7d, 0x90, 0xe1, 0x56, 0x14, 0x67, + 0x6d, 0x37, 0x7d, 0xf8, 0xb1, 0x0e, 0x38, 0xdb, 0x4a, 0x02, 0x14, + 0x49, 0x6d, 0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32, 0xd1, 0xf9, + 0x91, 0x20, 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: including undefined tags + // tcID: 36 + {SEC_OID_SHA1, + 36, + {0x30, 0x35, 0x02, 0x15, 0x00, 0xaa, 0x6a, 0x25, 0x8f, 0xbf, 0x7d, + 0x90, 0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37, 0x7d, 0xf8, 0xb1, 0x0e, + 0x38, 0xdb, 0x4a, 0x22, 0x1c, 0xaa, 0x00, 0xbb, 0x00, 0xcd, 0x00, + 0x02, 0x14, 0x49, 0x6d, 0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32, + 0xd1, 0xf9, 0x91, 0x20, 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: including undefined tags + // tcID: 37 + {SEC_OID_SHA1, + 37, + {0x30, 0x33, 0x02, 0x15, 0x00, 0xaa, 0x6a, 0x25, 0x8f, 0xbf, 0x7d, + 0x90, 0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37, 0x7d, 0xf8, 0xb1, 0x0e, + 0x38, 0xdb, 0x4a, 0x22, 0x1a, 0xaa, 0x02, 0xaa, 0xbb, 0x02, 0x14, + 0x49, 0x6d, 0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32, 0xd1, 0xf9, + 0x91, 0x20, 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: truncated length of sequence + // tcID: 38 + {SEC_OID_SHA1, + 38, + {0x30, 0x81}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: using composition with indefinite length + // tcID: 39 + {SEC_OID_SHA1, + 39, + {0x30, 0x80, 0x30, 0x2d, 0x02, 0x15, 0x00, 0xaa, 0x6a, 0x25, 0x8f, + 0xbf, 0x7d, 0x90, 0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37, 0x7d, 0xf8, + 0xb1, 0x0e, 0x38, 0xdb, 0x4a, 0x02, 0x14, 0x49, 0x6d, 0x52, 0x20, + 0xb5, 0xf6, 0x7d, 0x35, 0x32, 0xd1, 0xf9, 0x91, 0x20, 0x3b, 0xc3, + 0x52, 0x3b, 0x96, 0x4c, 0x3b, 0x00, 0x00}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: using composition with indefinite length + // tcID: 40 + {SEC_OID_SHA1, + 40, + {0x30, 0x31, 0x22, 0x80, 0x02, 0x15, 0x00, 0xaa, 0x6a, 0x25, 0x8f, + 0xbf, 0x7d, 0x90, 0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37, 0x7d, 0xf8, + 0xb1, 0x0e, 0x38, 0xdb, 0x4a, 0x00, 0x00, 0x02, 0x14, 0x49, 0x6d, + 0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32, 0xd1, 0xf9, 0x91, 0x20, + 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: using composition with indefinite length + // tcID: 41 + {SEC_OID_SHA1, + 41, + {0x30, 0x31, 0x02, 0x15, 0x00, 0xaa, 0x6a, 0x25, 0x8f, 0xbf, 0x7d, + 0x90, 0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37, 0x7d, 0xf8, 0xb1, 0x0e, + 0x38, 0xdb, 0x4a, 0x22, 0x80, 0x02, 0x14, 0x49, 0x6d, 0x52, 0x20, + 0xb5, 0xf6, 0x7d, 0x35, 0x32, 0xd1, 0xf9, 0x91, 0x20, 0x3b, 0xc3, + 0x52, 0x3b, 0x96, 0x4c, 0x3b, 0x00, 0x00}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: using composition with wrong tag + // tcID: 42 + {SEC_OID_SHA1, + 42, + {0x30, 0x80, 0x31, 0x2d, 0x02, 0x15, 0x00, 0xaa, 0x6a, 0x25, 0x8f, + 0xbf, 0x7d, 0x90, 0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37, 0x7d, 0xf8, + 0xb1, 0x0e, 0x38, 0xdb, 0x4a, 0x02, 0x14, 0x49, 0x6d, 0x52, 0x20, + 0xb5, 0xf6, 0x7d, 0x35, 0x32, 0xd1, 0xf9, 0x91, 0x20, 0x3b, 0xc3, + 0x52, 0x3b, 0x96, 0x4c, 0x3b, 0x00, 0x00}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: using composition with wrong tag + // tcID: 43 + {SEC_OID_SHA1, + 43, + {0x30, 0x31, 0x22, 0x80, 0x03, 0x15, 0x00, 0xaa, 0x6a, 0x25, 0x8f, + 0xbf, 0x7d, 0x90, 0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37, 0x7d, 0xf8, + 0xb1, 0x0e, 0x38, 0xdb, 0x4a, 0x00, 0x00, 0x02, 0x14, 0x49, 0x6d, + 0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32, 0xd1, 0xf9, 0x91, 0x20, + 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: using composition with wrong tag + // tcID: 44 + {SEC_OID_SHA1, + 44, + {0x30, 0x31, 0x02, 0x15, 0x00, 0xaa, 0x6a, 0x25, 0x8f, 0xbf, 0x7d, + 0x90, 0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37, 0x7d, 0xf8, 0xb1, 0x0e, + 0x38, 0xdb, 0x4a, 0x22, 0x80, 0x03, 0x14, 0x49, 0x6d, 0x52, 0x20, + 0xb5, 0xf6, 0x7d, 0x35, 0x32, 0xd1, 0xf9, 0x91, 0x20, 0x3b, 0xc3, + 0x52, 0x3b, 0x96, 0x4c, 0x3b, 0x00, 0x00}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: Replacing sequence with NULL + // tcID: 45 + {SEC_OID_SHA1, + 45, + {0x05, 0x00}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: changing tag value of sequence + // tcID: 46 + {SEC_OID_SHA1, + 46, + {0x2e, 0x2d, 0x02, 0x15, 0x00, 0xaa, 0x6a, 0x25, 0x8f, 0xbf, 0x7d, 0x90, + 0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37, 0x7d, 0xf8, 0xb1, 0x0e, 0x38, 0xdb, + 0x4a, 0x02, 0x14, 0x49, 0x6d, 0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32, + 0xd1, 0xf9, 0x91, 0x20, 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: changing tag value of sequence + // tcID: 47 + {SEC_OID_SHA1, + 47, + {0x2f, 0x2d, 0x02, 0x15, 0x00, 0xaa, 0x6a, 0x25, 0x8f, 0xbf, 0x7d, 0x90, + 0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37, 0x7d, 0xf8, 0xb1, 0x0e, 0x38, 0xdb, + 0x4a, 0x02, 0x14, 0x49, 0x6d, 0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32, + 0xd1, 0xf9, 0x91, 0x20, 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: changing tag value of sequence + // tcID: 48 + {SEC_OID_SHA1, + 48, + {0x31, 0x2d, 0x02, 0x15, 0x00, 0xaa, 0x6a, 0x25, 0x8f, 0xbf, 0x7d, 0x90, + 0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37, 0x7d, 0xf8, 0xb1, 0x0e, 0x38, 0xdb, + 0x4a, 0x02, 0x14, 0x49, 0x6d, 0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32, + 0xd1, 0xf9, 0x91, 0x20, 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: changing tag value of sequence + // tcID: 49 + {SEC_OID_SHA1, + 49, + {0x32, 0x2d, 0x02, 0x15, 0x00, 0xaa, 0x6a, 0x25, 0x8f, 0xbf, 0x7d, 0x90, + 0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37, 0x7d, 0xf8, 0xb1, 0x0e, 0x38, 0xdb, + 0x4a, 0x02, 0x14, 0x49, 0x6d, 0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32, + 0xd1, 0xf9, 0x91, 0x20, 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: changing tag value of sequence + // tcID: 50 + {SEC_OID_SHA1, + 50, + {0xff, 0x2d, 0x02, 0x15, 0x00, 0xaa, 0x6a, 0x25, 0x8f, 0xbf, 0x7d, 0x90, + 0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37, 0x7d, 0xf8, 0xb1, 0x0e, 0x38, 0xdb, + 0x4a, 0x02, 0x14, 0x49, 0x6d, 0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32, + 0xd1, 0xf9, 0x91, 0x20, 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: dropping value of sequence + // tcID: 51 + {SEC_OID_SHA1, + 51, + {0x30, 0x00}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: using composition for sequence + // tcID: 52 + {SEC_OID_SHA1, + 52, + {0x30, 0x31, 0x30, 0x01, 0x02, 0x30, 0x2c, 0x15, 0x00, 0xaa, 0x6a, + 0x25, 0x8f, 0xbf, 0x7d, 0x90, 0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37, + 0x7d, 0xf8, 0xb1, 0x0e, 0x38, 0xdb, 0x4a, 0x02, 0x14, 0x49, 0x6d, + 0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32, 0xd1, 0xf9, 0x91, 0x20, + 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: truncated sequence + // tcID: 53 + {SEC_OID_SHA1, + 53, + {0x30, 0x2c, 0x02, 0x15, 0x00, 0xaa, 0x6a, 0x25, 0x8f, 0xbf, 0x7d, 0x90, + 0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37, 0x7d, 0xf8, 0xb1, 0x0e, 0x38, 0xdb, + 0x4a, 0x02, 0x14, 0x49, 0x6d, 0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32, + 0xd1, 0xf9, 0x91, 0x20, 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: truncated sequence + // tcID: 54 + {SEC_OID_SHA1, + 54, + {0x30, 0x2c, 0x15, 0x00, 0xaa, 0x6a, 0x25, 0x8f, 0xbf, 0x7d, 0x90, 0xe1, + 0x56, 0x14, 0x67, 0x6d, 0x37, 0x7d, 0xf8, 0xb1, 0x0e, 0x38, 0xdb, 0x4a, + 0x02, 0x14, 0x49, 0x6d, 0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32, 0xd1, + 0xf9, 0x91, 0x20, 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: indefinite length + // tcID: 55 + {SEC_OID_SHA1, + 55, + {0x30, 0x80, 0x02, 0x15, 0x00, 0xaa, 0x6a, 0x25, 0x8f, 0xbf, + 0x7d, 0x90, 0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37, 0x7d, 0xf8, + 0xb1, 0x0e, 0x38, 0xdb, 0x4a, 0x02, 0x14, 0x49, 0x6d, 0x52, + 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32, 0xd1, 0xf9, 0x91, 0x20, + 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b, 0x00, 0x00}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: indefinite length with truncated delimiter + // tcID: 56 + {SEC_OID_SHA1, + 56, + {0x30, 0x80, 0x02, 0x15, 0x00, 0xaa, 0x6a, 0x25, 0x8f, 0xbf, 0x7d, 0x90, + 0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37, 0x7d, 0xf8, 0xb1, 0x0e, 0x38, 0xdb, + 0x4a, 0x02, 0x14, 0x49, 0x6d, 0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32, + 0xd1, 0xf9, 0x91, 0x20, 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b, 0x00}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: indefinite length with additional element + // tcID: 57 + {SEC_OID_SHA1, + 57, + {0x30, 0x80, 0x02, 0x15, 0x00, 0xaa, 0x6a, 0x25, 0x8f, 0xbf, 0x7d, + 0x90, 0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37, 0x7d, 0xf8, 0xb1, 0x0e, + 0x38, 0xdb, 0x4a, 0x02, 0x14, 0x49, 0x6d, 0x52, 0x20, 0xb5, 0xf6, + 0x7d, 0x35, 0x32, 0xd1, 0xf9, 0x91, 0x20, 0x3b, 0xc3, 0x52, 0x3b, + 0x96, 0x4c, 0x3b, 0x05, 0x00, 0x00, 0x00}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: indefinite length with truncated element + // tcID: 58 + {SEC_OID_SHA1, + 58, + {0x30, 0x80, 0x02, 0x15, 0x00, 0xaa, 0x6a, 0x25, 0x8f, 0xbf, 0x7d, + 0x90, 0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37, 0x7d, 0xf8, 0xb1, 0x0e, + 0x38, 0xdb, 0x4a, 0x02, 0x14, 0x49, 0x6d, 0x52, 0x20, 0xb5, 0xf6, + 0x7d, 0x35, 0x32, 0xd1, 0xf9, 0x91, 0x20, 0x3b, 0xc3, 0x52, 0x3b, + 0x96, 0x4c, 0x3b, 0x06, 0x08, 0x11, 0x22, 0x00, 0x00}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: indefinite length with garbage + // tcID: 59 + {SEC_OID_SHA1, + 59, + {0x30, 0x80, 0x02, 0x15, 0x00, 0xaa, 0x6a, 0x25, 0x8f, 0xbf, 0x7d, + 0x90, 0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37, 0x7d, 0xf8, 0xb1, 0x0e, + 0x38, 0xdb, 0x4a, 0x02, 0x14, 0x49, 0x6d, 0x52, 0x20, 0xb5, 0xf6, + 0x7d, 0x35, 0x32, 0xd1, 0xf9, 0x91, 0x20, 0x3b, 0xc3, 0x52, 0x3b, + 0x96, 0x4c, 0x3b, 0x00, 0x00, 0xfe, 0x02, 0xbe, 0xef}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: indefinite length with nonempty EOC + // tcID: 60 + {SEC_OID_SHA1, + 60, + {0x30, 0x80, 0x02, 0x15, 0x00, 0xaa, 0x6a, 0x25, 0x8f, 0xbf, 0x7d, + 0x90, 0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37, 0x7d, 0xf8, 0xb1, 0x0e, + 0x38, 0xdb, 0x4a, 0x02, 0x14, 0x49, 0x6d, 0x52, 0x20, 0xb5, 0xf6, + 0x7d, 0x35, 0x32, 0xd1, 0xf9, 0x91, 0x20, 0x3b, 0xc3, 0x52, 0x3b, + 0x96, 0x4c, 0x3b, 0x00, 0x02, 0xbe, 0xef}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: prepend empty sequence + // tcID: 61 + {SEC_OID_SHA1, + 61, + {0x30, 0x2f, 0x30, 0x00, 0x02, 0x15, 0x00, 0xaa, 0x6a, 0x25, + 0x8f, 0xbf, 0x7d, 0x90, 0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37, + 0x7d, 0xf8, 0xb1, 0x0e, 0x38, 0xdb, 0x4a, 0x02, 0x14, 0x49, + 0x6d, 0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32, 0xd1, 0xf9, + 0x91, 0x20, 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: append empty sequence + // tcID: 62 + {SEC_OID_SHA1, + 62, + {0x30, 0x2f, 0x02, 0x15, 0x00, 0xaa, 0x6a, 0x25, 0x8f, 0xbf, + 0x7d, 0x90, 0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37, 0x7d, 0xf8, + 0xb1, 0x0e, 0x38, 0xdb, 0x4a, 0x02, 0x14, 0x49, 0x6d, 0x52, + 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32, 0xd1, 0xf9, 0x91, 0x20, + 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b, 0x30, 0x00}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: append garbage with high tag number + // tcID: 63 + {SEC_OID_SHA1, + 63, + {0x30, 0x30, 0x02, 0x15, 0x00, 0xaa, 0x6a, 0x25, 0x8f, 0xbf, + 0x7d, 0x90, 0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37, 0x7d, 0xf8, + 0xb1, 0x0e, 0x38, 0xdb, 0x4a, 0x02, 0x14, 0x49, 0x6d, 0x52, + 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32, 0xd1, 0xf9, 0x91, 0x20, + 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b, 0xbf, 0x7f, 0x00}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: sequence of sequence + // tcID: 64 + {SEC_OID_SHA1, + 64, + {0x30, 0x2f, 0x30, 0x2d, 0x02, 0x15, 0x00, 0xaa, 0x6a, 0x25, + 0x8f, 0xbf, 0x7d, 0x90, 0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37, + 0x7d, 0xf8, 0xb1, 0x0e, 0x38, 0xdb, 0x4a, 0x02, 0x14, 0x49, + 0x6d, 0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32, 0xd1, 0xf9, + 0x91, 0x20, 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: truncated sequence: removed last 1 elements + // tcID: 65 + {SEC_OID_SHA1, + 65, + {0x30, 0x17, 0x02, 0x15, 0x00, 0xaa, 0x6a, 0x25, 0x8f, + 0xbf, 0x7d, 0x90, 0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37, + 0x7d, 0xf8, 0xb1, 0x0e, 0x38, 0xdb, 0x4a}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: repeating element in sequence + // tcID: 66 + {SEC_OID_SHA1, + 66, + {0x30, 0x43, 0x02, 0x15, 0x00, 0xaa, 0x6a, 0x25, 0x8f, 0xbf, 0x7d, 0x90, + 0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37, 0x7d, 0xf8, 0xb1, 0x0e, 0x38, 0xdb, + 0x4a, 0x02, 0x14, 0x49, 0x6d, 0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32, + 0xd1, 0xf9, 0x91, 0x20, 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b, 0x02, + 0x14, 0x49, 0x6d, 0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32, 0xd1, 0xf9, + 0x91, 0x20, 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: long form encoding of length of integer + // tcID: 67 + {SEC_OID_SHA1, + 67, + {0x30, 0x2e, 0x02, 0x81, 0x15, 0x00, 0xaa, 0x6a, 0x25, 0x8f, 0xbf, 0x7d, + 0x90, 0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37, 0x7d, 0xf8, 0xb1, 0x0e, 0x38, + 0xdb, 0x4a, 0x02, 0x14, 0x49, 0x6d, 0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35, + 0x32, 0xd1, 0xf9, 0x91, 0x20, 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: long form encoding of length of integer + // tcID: 68 + {SEC_OID_SHA1, + 68, + {0x30, 0x2e, 0x02, 0x15, 0x00, 0xaa, 0x6a, 0x25, 0x8f, 0xbf, 0x7d, 0x90, + 0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37, 0x7d, 0xf8, 0xb1, 0x0e, 0x38, 0xdb, + 0x4a, 0x02, 0x81, 0x14, 0x49, 0x6d, 0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35, + 0x32, 0xd1, 0xf9, 0x91, 0x20, 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: length of integer contains leading 0 + // tcID: 69 + {SEC_OID_SHA1, + 69, + {0x30, 0x2f, 0x02, 0x82, 0x00, 0x15, 0x00, 0xaa, 0x6a, 0x25, + 0x8f, 0xbf, 0x7d, 0x90, 0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37, + 0x7d, 0xf8, 0xb1, 0x0e, 0x38, 0xdb, 0x4a, 0x02, 0x14, 0x49, + 0x6d, 0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32, 0xd1, 0xf9, + 0x91, 0x20, 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: length of integer contains leading 0 + // tcID: 70 + {SEC_OID_SHA1, + 70, + {0x30, 0x2f, 0x02, 0x15, 0x00, 0xaa, 0x6a, 0x25, 0x8f, 0xbf, + 0x7d, 0x90, 0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37, 0x7d, 0xf8, + 0xb1, 0x0e, 0x38, 0xdb, 0x4a, 0x02, 0x82, 0x00, 0x14, 0x49, + 0x6d, 0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32, 0xd1, 0xf9, + 0x91, 0x20, 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: wrong length of integer + // tcID: 71 + {SEC_OID_SHA1, + 71, + {0x30, 0x2d, 0x02, 0x16, 0x00, 0xaa, 0x6a, 0x25, 0x8f, 0xbf, 0x7d, 0x90, + 0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37, 0x7d, 0xf8, 0xb1, 0x0e, 0x38, 0xdb, + 0x4a, 0x02, 0x14, 0x49, 0x6d, 0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32, + 0xd1, 0xf9, 0x91, 0x20, 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: wrong length of integer + // tcID: 72 + {SEC_OID_SHA1, + 72, + {0x30, 0x2d, 0x02, 0x14, 0x00, 0xaa, 0x6a, 0x25, 0x8f, 0xbf, 0x7d, 0x90, + 0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37, 0x7d, 0xf8, 0xb1, 0x0e, 0x38, 0xdb, + 0x4a, 0x02, 0x14, 0x49, 0x6d, 0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32, + 0xd1, 0xf9, 0x91, 0x20, 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: wrong length of integer + // tcID: 73 + {SEC_OID_SHA1, + 73, + {0x30, 0x2d, 0x02, 0x15, 0x00, 0xaa, 0x6a, 0x25, 0x8f, 0xbf, 0x7d, 0x90, + 0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37, 0x7d, 0xf8, 0xb1, 0x0e, 0x38, 0xdb, + 0x4a, 0x02, 0x15, 0x49, 0x6d, 0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32, + 0xd1, 0xf9, 0x91, 0x20, 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: wrong length of integer + // tcID: 74 + {SEC_OID_SHA1, + 74, + {0x30, 0x2d, 0x02, 0x15, 0x00, 0xaa, 0x6a, 0x25, 0x8f, 0xbf, 0x7d, 0x90, + 0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37, 0x7d, 0xf8, 0xb1, 0x0e, 0x38, 0xdb, + 0x4a, 0x02, 0x13, 0x49, 0x6d, 0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32, + 0xd1, 0xf9, 0x91, 0x20, 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: uint32 overflow in length of integer + // tcID: 75 + {SEC_OID_SHA1, + 75, + {0x30, 0x32, 0x02, 0x85, 0x01, 0x00, 0x00, 0x00, 0x15, 0x00, 0xaa, + 0x6a, 0x25, 0x8f, 0xbf, 0x7d, 0x90, 0xe1, 0x56, 0x14, 0x67, 0x6d, + 0x37, 0x7d, 0xf8, 0xb1, 0x0e, 0x38, 0xdb, 0x4a, 0x02, 0x14, 0x49, + 0x6d, 0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32, 0xd1, 0xf9, 0x91, + 0x20, 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: uint32 overflow in length of integer + // tcID: 76 + {SEC_OID_SHA1, + 76, + {0x30, 0x32, 0x02, 0x15, 0x00, 0xaa, 0x6a, 0x25, 0x8f, 0xbf, 0x7d, + 0x90, 0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37, 0x7d, 0xf8, 0xb1, 0x0e, + 0x38, 0xdb, 0x4a, 0x02, 0x85, 0x01, 0x00, 0x00, 0x00, 0x14, 0x49, + 0x6d, 0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32, 0xd1, 0xf9, 0x91, + 0x20, 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: uint64 overflow in length of integer + // tcID: 77 + {SEC_OID_SHA1, + 77, + {0x30, 0x36, 0x02, 0x89, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, + 0x15, 0x00, 0xaa, 0x6a, 0x25, 0x8f, 0xbf, 0x7d, 0x90, 0xe1, 0x56, 0x14, + 0x67, 0x6d, 0x37, 0x7d, 0xf8, 0xb1, 0x0e, 0x38, 0xdb, 0x4a, 0x02, 0x14, + 0x49, 0x6d, 0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32, 0xd1, 0xf9, 0x91, + 0x20, 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: uint64 overflow in length of integer + // tcID: 78 + {SEC_OID_SHA1, + 78, + {0x30, 0x36, 0x02, 0x15, 0x00, 0xaa, 0x6a, 0x25, 0x8f, 0xbf, 0x7d, 0x90, + 0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37, 0x7d, 0xf8, 0xb1, 0x0e, 0x38, 0xdb, + 0x4a, 0x02, 0x89, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x14, + 0x49, 0x6d, 0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32, 0xd1, 0xf9, 0x91, + 0x20, 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: length of integer = 2**31 - 1 + // tcID: 79 + {SEC_OID_SHA1, + 79, + {0x30, 0x31, 0x02, 0x84, 0x7f, 0xff, 0xff, 0xff, 0x00, 0xaa, 0x6a, + 0x25, 0x8f, 0xbf, 0x7d, 0x90, 0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37, + 0x7d, 0xf8, 0xb1, 0x0e, 0x38, 0xdb, 0x4a, 0x02, 0x14, 0x49, 0x6d, + 0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32, 0xd1, 0xf9, 0x91, 0x20, + 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: length of integer = 2**31 - 1 + // tcID: 80 + {SEC_OID_SHA1, + 80, + {0x30, 0x31, 0x02, 0x15, 0x00, 0xaa, 0x6a, 0x25, 0x8f, 0xbf, 0x7d, + 0x90, 0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37, 0x7d, 0xf8, 0xb1, 0x0e, + 0x38, 0xdb, 0x4a, 0x02, 0x84, 0x7f, 0xff, 0xff, 0xff, 0x49, 0x6d, + 0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32, 0xd1, 0xf9, 0x91, 0x20, + 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: length of integer = 2**32 - 1 + // tcID: 81 + {SEC_OID_SHA1, + 81, + {0x30, 0x31, 0x02, 0x84, 0xff, 0xff, 0xff, 0xff, 0x00, 0xaa, 0x6a, + 0x25, 0x8f, 0xbf, 0x7d, 0x90, 0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37, + 0x7d, 0xf8, 0xb1, 0x0e, 0x38, 0xdb, 0x4a, 0x02, 0x14, 0x49, 0x6d, + 0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32, 0xd1, 0xf9, 0x91, 0x20, + 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: length of integer = 2**32 - 1 + // tcID: 82 + {SEC_OID_SHA1, + 82, + {0x30, 0x31, 0x02, 0x15, 0x00, 0xaa, 0x6a, 0x25, 0x8f, 0xbf, 0x7d, + 0x90, 0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37, 0x7d, 0xf8, 0xb1, 0x0e, + 0x38, 0xdb, 0x4a, 0x02, 0x84, 0xff, 0xff, 0xff, 0xff, 0x49, 0x6d, + 0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32, 0xd1, 0xf9, 0x91, 0x20, + 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: length of integer = 2**40 - 1 + // tcID: 83 + {SEC_OID_SHA1, + 83, + {0x30, 0x32, 0x02, 0x85, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0xaa, + 0x6a, 0x25, 0x8f, 0xbf, 0x7d, 0x90, 0xe1, 0x56, 0x14, 0x67, 0x6d, + 0x37, 0x7d, 0xf8, 0xb1, 0x0e, 0x38, 0xdb, 0x4a, 0x02, 0x14, 0x49, + 0x6d, 0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32, 0xd1, 0xf9, 0x91, + 0x20, 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: length of integer = 2**40 - 1 + // tcID: 84 + {SEC_OID_SHA1, + 84, + {0x30, 0x32, 0x02, 0x15, 0x00, 0xaa, 0x6a, 0x25, 0x8f, 0xbf, 0x7d, + 0x90, 0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37, 0x7d, 0xf8, 0xb1, 0x0e, + 0x38, 0xdb, 0x4a, 0x02, 0x85, 0xff, 0xff, 0xff, 0xff, 0xff, 0x49, + 0x6d, 0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32, 0xd1, 0xf9, 0x91, + 0x20, 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: length of integer = 2**64 - 1 + // tcID: 85 + {SEC_OID_SHA1, + 85, + {0x30, 0x35, 0x02, 0x88, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, + 0xff, 0x00, 0xaa, 0x6a, 0x25, 0x8f, 0xbf, 0x7d, 0x90, 0xe1, 0x56, + 0x14, 0x67, 0x6d, 0x37, 0x7d, 0xf8, 0xb1, 0x0e, 0x38, 0xdb, 0x4a, + 0x02, 0x14, 0x49, 0x6d, 0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32, + 0xd1, 0xf9, 0x91, 0x20, 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: length of integer = 2**64 - 1 + // tcID: 86 + {SEC_OID_SHA1, + 86, + {0x30, 0x35, 0x02, 0x15, 0x00, 0xaa, 0x6a, 0x25, 0x8f, 0xbf, 0x7d, + 0x90, 0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37, 0x7d, 0xf8, 0xb1, 0x0e, + 0x38, 0xdb, 0x4a, 0x02, 0x88, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, + 0xff, 0xff, 0x49, 0x6d, 0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32, + 0xd1, 0xf9, 0x91, 0x20, 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: incorrect length of integer + // tcID: 87 + {SEC_OID_SHA1, + 87, + {0x30, 0x2d, 0x02, 0xff, 0x00, 0xaa, 0x6a, 0x25, 0x8f, 0xbf, 0x7d, 0x90, + 0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37, 0x7d, 0xf8, 0xb1, 0x0e, 0x38, 0xdb, + 0x4a, 0x02, 0x14, 0x49, 0x6d, 0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32, + 0xd1, 0xf9, 0x91, 0x20, 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: incorrect length of integer + // tcID: 88 + {SEC_OID_SHA1, + 88, + {0x30, 0x2d, 0x02, 0x15, 0x00, 0xaa, 0x6a, 0x25, 0x8f, 0xbf, 0x7d, 0x90, + 0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37, 0x7d, 0xf8, 0xb1, 0x0e, 0x38, 0xdb, + 0x4a, 0x02, 0xff, 0x49, 0x6d, 0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32, + 0xd1, 0xf9, 0x91, 0x20, 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: removing integer + // tcID: 89 + {SEC_OID_SHA1, + 89, + {0x30, 0x16, 0x02, 0x14, 0x49, 0x6d, 0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35, + 0x32, 0xd1, 0xf9, 0x91, 0x20, 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: lonely integer tag + // tcID: 90 + {SEC_OID_SHA1, + 90, + {0x30, 0x17, 0x02, 0x02, 0x14, 0x49, 0x6d, 0x52, 0x20, + 0xb5, 0xf6, 0x7d, 0x35, 0x32, 0xd1, 0xf9, 0x91, 0x20, + 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: lonely integer tag + // tcID: 91 + {SEC_OID_SHA1, + 91, + {0x30, 0x18, 0x02, 0x15, 0x00, 0xaa, 0x6a, 0x25, 0x8f, + 0xbf, 0x7d, 0x90, 0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37, + 0x7d, 0xf8, 0xb1, 0x0e, 0x38, 0xdb, 0x4a, 0x02}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: appending 0's to integer + // tcID: 92 + {SEC_OID_SHA1, + 92, + {0x30, 0x2f, 0x02, 0x17, 0x00, 0xaa, 0x6a, 0x25, 0x8f, 0xbf, + 0x7d, 0x90, 0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37, 0x7d, 0xf8, + 0xb1, 0x0e, 0x38, 0xdb, 0x4a, 0x00, 0x00, 0x02, 0x14, 0x49, + 0x6d, 0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32, 0xd1, 0xf9, + 0x91, 0x20, 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: appending 0's to integer + // tcID: 93 + {SEC_OID_SHA1, + 93, + {0x30, 0x2f, 0x02, 0x15, 0x00, 0xaa, 0x6a, 0x25, 0x8f, 0xbf, + 0x7d, 0x90, 0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37, 0x7d, 0xf8, + 0xb1, 0x0e, 0x38, 0xdb, 0x4a, 0x02, 0x16, 0x49, 0x6d, 0x52, + 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32, 0xd1, 0xf9, 0x91, 0x20, + 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b, 0x00, 0x00}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: prepending 0's to integer + // tcID: 94 + {SEC_OID_SHA1, + 94, + {0x30, 0x2f, 0x02, 0x17, 0x00, 0x00, 0x00, 0xaa, 0x6a, 0x25, + 0x8f, 0xbf, 0x7d, 0x90, 0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37, + 0x7d, 0xf8, 0xb1, 0x0e, 0x38, 0xdb, 0x4a, 0x02, 0x14, 0x49, + 0x6d, 0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32, 0xd1, 0xf9, + 0x91, 0x20, 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: prepending 0's to integer + // tcID: 95 + {SEC_OID_SHA1, + 95, + {0x30, 0x2f, 0x02, 0x15, 0x00, 0xaa, 0x6a, 0x25, 0x8f, 0xbf, + 0x7d, 0x90, 0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37, 0x7d, 0xf8, + 0xb1, 0x0e, 0x38, 0xdb, 0x4a, 0x02, 0x16, 0x00, 0x00, 0x49, + 0x6d, 0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32, 0xd1, 0xf9, + 0x91, 0x20, 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: appending unused 0's to integer + // tcID: 96 + {SEC_OID_SHA1, + 96, + {0x30, 0x2f, 0x02, 0x15, 0x00, 0xaa, 0x6a, 0x25, 0x8f, 0xbf, + 0x7d, 0x90, 0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37, 0x7d, 0xf8, + 0xb1, 0x0e, 0x38, 0xdb, 0x4a, 0x00, 0x00, 0x02, 0x14, 0x49, + 0x6d, 0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32, 0xd1, 0xf9, + 0x91, 0x20, 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: appending null value to integer + // tcID: 97 + {SEC_OID_SHA1, + 97, + {0x30, 0x2f, 0x02, 0x17, 0x00, 0xaa, 0x6a, 0x25, 0x8f, 0xbf, + 0x7d, 0x90, 0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37, 0x7d, 0xf8, + 0xb1, 0x0e, 0x38, 0xdb, 0x4a, 0x05, 0x00, 0x02, 0x14, 0x49, + 0x6d, 0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32, 0xd1, 0xf9, + 0x91, 0x20, 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: appending null value to integer + // tcID: 98 + {SEC_OID_SHA1, + 98, + {0x30, 0x2f, 0x02, 0x15, 0x00, 0xaa, 0x6a, 0x25, 0x8f, 0xbf, + 0x7d, 0x90, 0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37, 0x7d, 0xf8, + 0xb1, 0x0e, 0x38, 0xdb, 0x4a, 0x02, 0x16, 0x49, 0x6d, 0x52, + 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32, 0xd1, 0xf9, 0x91, 0x20, + 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b, 0x05, 0x00}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: truncated length of integer + // tcID: 99 + {SEC_OID_SHA1, + 99, + {0x30, 0x18, 0x02, 0x81, 0x02, 0x14, 0x49, 0x6d, 0x52, + 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32, 0xd1, 0xf9, 0x91, + 0x20, 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: truncated length of integer + // tcID: 100 + {SEC_OID_SHA1, + 100, + {0x30, 0x19, 0x02, 0x15, 0x00, 0xaa, 0x6a, 0x25, 0x8f, + 0xbf, 0x7d, 0x90, 0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37, + 0x7d, 0xf8, 0xb1, 0x0e, 0x38, 0xdb, 0x4a, 0x02, 0x81}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: Replacing integer with NULL + // tcID: 101 + {SEC_OID_SHA1, + 101, + {0x30, 0x18, 0x05, 0x00, 0x02, 0x14, 0x49, 0x6d, 0x52, + 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32, 0xd1, 0xf9, 0x91, + 0x20, 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: Replacing integer with NULL + // tcID: 102 + {SEC_OID_SHA1, + 102, + {0x30, 0x19, 0x02, 0x15, 0x00, 0xaa, 0x6a, 0x25, 0x8f, + 0xbf, 0x7d, 0x90, 0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37, + 0x7d, 0xf8, 0xb1, 0x0e, 0x38, 0xdb, 0x4a, 0x05, 0x00}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: changing tag value of integer + // tcID: 103 + {SEC_OID_SHA1, + 103, + {0x30, 0x2d, 0x00, 0x15, 0x00, 0xaa, 0x6a, 0x25, 0x8f, 0xbf, 0x7d, 0x90, + 0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37, 0x7d, 0xf8, 0xb1, 0x0e, 0x38, 0xdb, + 0x4a, 0x02, 0x14, 0x49, 0x6d, 0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32, + 0xd1, 0xf9, 0x91, 0x20, 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: changing tag value of integer + // tcID: 104 + {SEC_OID_SHA1, + 104, + {0x30, 0x2d, 0x01, 0x15, 0x00, 0xaa, 0x6a, 0x25, 0x8f, 0xbf, 0x7d, 0x90, + 0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37, 0x7d, 0xf8, 0xb1, 0x0e, 0x38, 0xdb, + 0x4a, 0x02, 0x14, 0x49, 0x6d, 0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32, + 0xd1, 0xf9, 0x91, 0x20, 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: changing tag value of integer + // tcID: 105 + {SEC_OID_SHA1, + 105, + {0x30, 0x2d, 0x03, 0x15, 0x00, 0xaa, 0x6a, 0x25, 0x8f, 0xbf, 0x7d, 0x90, + 0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37, 0x7d, 0xf8, 0xb1, 0x0e, 0x38, 0xdb, + 0x4a, 0x02, 0x14, 0x49, 0x6d, 0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32, + 0xd1, 0xf9, 0x91, 0x20, 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: changing tag value of integer + // tcID: 106 + {SEC_OID_SHA1, + 106, + {0x30, 0x2d, 0x04, 0x15, 0x00, 0xaa, 0x6a, 0x25, 0x8f, 0xbf, 0x7d, 0x90, + 0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37, 0x7d, 0xf8, 0xb1, 0x0e, 0x38, 0xdb, + 0x4a, 0x02, 0x14, 0x49, 0x6d, 0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32, + 0xd1, 0xf9, 0x91, 0x20, 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: changing tag value of integer + // tcID: 107 + {SEC_OID_SHA1, + 107, + {0x30, 0x2d, 0xff, 0x15, 0x00, 0xaa, 0x6a, 0x25, 0x8f, 0xbf, 0x7d, 0x90, + 0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37, 0x7d, 0xf8, 0xb1, 0x0e, 0x38, 0xdb, + 0x4a, 0x02, 0x14, 0x49, 0x6d, 0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32, + 0xd1, 0xf9, 0x91, 0x20, 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: changing tag value of integer + // tcID: 108 + {SEC_OID_SHA1, + 108, + {0x30, 0x2d, 0x02, 0x15, 0x00, 0xaa, 0x6a, 0x25, 0x8f, 0xbf, 0x7d, 0x90, + 0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37, 0x7d, 0xf8, 0xb1, 0x0e, 0x38, 0xdb, + 0x4a, 0x00, 0x14, 0x49, 0x6d, 0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32, + 0xd1, 0xf9, 0x91, 0x20, 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: changing tag value of integer + // tcID: 109 + {SEC_OID_SHA1, + 109, + {0x30, 0x2d, 0x02, 0x15, 0x00, 0xaa, 0x6a, 0x25, 0x8f, 0xbf, 0x7d, 0x90, + 0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37, 0x7d, 0xf8, 0xb1, 0x0e, 0x38, 0xdb, + 0x4a, 0x01, 0x14, 0x49, 0x6d, 0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32, + 0xd1, 0xf9, 0x91, 0x20, 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: changing tag value of integer + // tcID: 110 + {SEC_OID_SHA1, + 110, + {0x30, 0x2d, 0x02, 0x15, 0x00, 0xaa, 0x6a, 0x25, 0x8f, 0xbf, 0x7d, 0x90, + 0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37, 0x7d, 0xf8, 0xb1, 0x0e, 0x38, 0xdb, + 0x4a, 0x03, 0x14, 0x49, 0x6d, 0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32, + 0xd1, 0xf9, 0x91, 0x20, 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: changing tag value of integer + // tcID: 111 + {SEC_OID_SHA1, + 111, + {0x30, 0x2d, 0x02, 0x15, 0x00, 0xaa, 0x6a, 0x25, 0x8f, 0xbf, 0x7d, 0x90, + 0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37, 0x7d, 0xf8, 0xb1, 0x0e, 0x38, 0xdb, + 0x4a, 0x04, 0x14, 0x49, 0x6d, 0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32, + 0xd1, 0xf9, 0x91, 0x20, 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: changing tag value of integer + // tcID: 112 + {SEC_OID_SHA1, + 112, + {0x30, 0x2d, 0x02, 0x15, 0x00, 0xaa, 0x6a, 0x25, 0x8f, 0xbf, 0x7d, 0x90, + 0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37, 0x7d, 0xf8, 0xb1, 0x0e, 0x38, 0xdb, + 0x4a, 0xff, 0x14, 0x49, 0x6d, 0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32, + 0xd1, 0xf9, 0x91, 0x20, 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: dropping value of integer + // tcID: 113 + {SEC_OID_SHA1, + 113, + {0x30, 0x18, 0x02, 0x00, 0x02, 0x14, 0x49, 0x6d, 0x52, + 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32, 0xd1, 0xf9, 0x91, + 0x20, 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: dropping value of integer + // tcID: 114 + {SEC_OID_SHA1, + 114, + {0x30, 0x19, 0x02, 0x15, 0x00, 0xaa, 0x6a, 0x25, 0x8f, + 0xbf, 0x7d, 0x90, 0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37, + 0x7d, 0xf8, 0xb1, 0x0e, 0x38, 0xdb, 0x4a, 0x02, 0x00}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: using composition for integer + // tcID: 115 + {SEC_OID_SHA1, + 115, + {0x30, 0x31, 0x22, 0x19, 0x02, 0x01, 0x00, 0x02, 0x14, 0xaa, 0x6a, + 0x25, 0x8f, 0xbf, 0x7d, 0x90, 0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37, + 0x7d, 0xf8, 0xb1, 0x0e, 0x38, 0xdb, 0x4a, 0x02, 0x14, 0x49, 0x6d, + 0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32, 0xd1, 0xf9, 0x91, 0x20, + 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: using composition for integer + // tcID: 116 + {SEC_OID_SHA1, + 116, + {0x30, 0x31, 0x02, 0x15, 0x00, 0xaa, 0x6a, 0x25, 0x8f, 0xbf, 0x7d, + 0x90, 0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37, 0x7d, 0xf8, 0xb1, 0x0e, + 0x38, 0xdb, 0x4a, 0x22, 0x18, 0x02, 0x01, 0x49, 0x02, 0x13, 0x6d, + 0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32, 0xd1, 0xf9, 0x91, 0x20, + 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: modify first byte of integer + // tcID: 117 + {SEC_OID_SHA1, + 117, + {0x30, 0x2d, 0x02, 0x15, 0x02, 0xaa, 0x6a, 0x25, 0x8f, 0xbf, 0x7d, 0x90, + 0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37, 0x7d, 0xf8, 0xb1, 0x0e, 0x38, 0xdb, + 0x4a, 0x02, 0x14, 0x49, 0x6d, 0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32, + 0xd1, 0xf9, 0x91, 0x20, 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: modify first byte of integer + // tcID: 118 + {SEC_OID_SHA1, + 118, + {0x30, 0x2d, 0x02, 0x15, 0x00, 0xaa, 0x6a, 0x25, 0x8f, 0xbf, 0x7d, 0x90, + 0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37, 0x7d, 0xf8, 0xb1, 0x0e, 0x38, 0xdb, + 0x4a, 0x02, 0x14, 0x4b, 0x6d, 0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32, + 0xd1, 0xf9, 0x91, 0x20, 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: modify last byte of integer + // tcID: 119 + {SEC_OID_SHA1, + 119, + {0x30, 0x2d, 0x02, 0x15, 0x00, 0xaa, 0x6a, 0x25, 0x8f, 0xbf, 0x7d, 0x90, + 0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37, 0x7d, 0xf8, 0xb1, 0x0e, 0x38, 0xdb, + 0xca, 0x02, 0x14, 0x49, 0x6d, 0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32, + 0xd1, 0xf9, 0x91, 0x20, 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: modify last byte of integer + // tcID: 120 + {SEC_OID_SHA1, + 120, + {0x30, 0x2d, 0x02, 0x15, 0x00, 0xaa, 0x6a, 0x25, 0x8f, 0xbf, 0x7d, 0x90, + 0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37, 0x7d, 0xf8, 0xb1, 0x0e, 0x38, 0xdb, + 0x4a, 0x02, 0x14, 0x49, 0x6d, 0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32, + 0xd1, 0xf9, 0x91, 0x20, 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0xbb}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: truncated integer + // tcID: 121 + {SEC_OID_SHA1, + 121, + {0x30, 0x2c, 0x02, 0x14, 0x00, 0xaa, 0x6a, 0x25, 0x8f, 0xbf, 0x7d, 0x90, + 0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37, 0x7d, 0xf8, 0xb1, 0x0e, 0x38, 0xdb, + 0x02, 0x14, 0x49, 0x6d, 0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32, 0xd1, + 0xf9, 0x91, 0x20, 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: truncated integer + // tcID: 122 + {SEC_OID_SHA1, + 122, + {0x30, 0x2c, 0x02, 0x15, 0x00, 0xaa, 0x6a, 0x25, 0x8f, 0xbf, 0x7d, 0x90, + 0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37, 0x7d, 0xf8, 0xb1, 0x0e, 0x38, 0xdb, + 0x4a, 0x02, 0x13, 0x49, 0x6d, 0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32, + 0xd1, 0xf9, 0x91, 0x20, 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: truncated integer + // tcID: 123 + {SEC_OID_SHA1, + 123, + {0x30, 0x2c, 0x02, 0x15, 0x00, 0xaa, 0x6a, 0x25, 0x8f, 0xbf, 0x7d, 0x90, + 0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37, 0x7d, 0xf8, 0xb1, 0x0e, 0x38, 0xdb, + 0x4a, 0x02, 0x13, 0x6d, 0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32, 0xd1, + 0xf9, 0x91, 0x20, 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: leading ff in integer + // tcID: 124 + {SEC_OID_SHA1, + 124, + {0x30, 0x2e, 0x02, 0x16, 0xff, 0x00, 0xaa, 0x6a, 0x25, 0x8f, 0xbf, 0x7d, + 0x90, 0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37, 0x7d, 0xf8, 0xb1, 0x0e, 0x38, + 0xdb, 0x4a, 0x02, 0x14, 0x49, 0x6d, 0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35, + 0x32, 0xd1, 0xf9, 0x91, 0x20, 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: leading ff in integer + // tcID: 125 + {SEC_OID_SHA1, + 125, + {0x30, 0x2e, 0x02, 0x15, 0x00, 0xaa, 0x6a, 0x25, 0x8f, 0xbf, 0x7d, 0x90, + 0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37, 0x7d, 0xf8, 0xb1, 0x0e, 0x38, 0xdb, + 0x4a, 0x02, 0x15, 0xff, 0x49, 0x6d, 0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35, + 0x32, 0xd1, 0xf9, 0x91, 0x20, 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: replaced integer by infinity + // tcID: 126 + {SEC_OID_SHA1, + 126, + {0x30, 0x19, 0x09, 0x01, 0x80, 0x02, 0x14, 0x49, 0x6d, + 0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32, 0xd1, 0xf9, + 0x91, 0x20, 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: replaced integer by infinity + // tcID: 127 + {SEC_OID_SHA1, + 127, + {0x30, 0x1a, 0x02, 0x15, 0x00, 0xaa, 0x6a, 0x25, 0x8f, 0xbf, + 0x7d, 0x90, 0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37, 0x7d, 0xf8, + 0xb1, 0x0e, 0x38, 0xdb, 0x4a, 0x09, 0x01, 0x80}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: replacing integer with zero + // tcID: 128 + {SEC_OID_SHA1, + 128, + {0x30, 0x19, 0x02, 0x01, 0x00, 0x02, 0x14, 0x49, 0x6d, + 0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32, 0xd1, 0xf9, + 0x91, 0x20, 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: replacing integer with zero + // tcID: 129 + {SEC_OID_SHA1, + 129, + {0x30, 0x1a, 0x02, 0x15, 0x00, 0xaa, 0x6a, 0x25, 0x8f, 0xbf, + 0x7d, 0x90, 0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37, 0x7d, 0xf8, + 0xb1, 0x0e, 0x38, 0xdb, 0x4a, 0x02, 0x01, 0x00}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: Modified r or s, e.g. by adding or subtracting the group order + // tcID: 130 + {SEC_OID_SHA1, + 130, + {0x30, 0x2d, 0x02, 0x15, 0x01, 0x63, 0x75, 0x5e, 0x49, 0xc9, 0xce, 0x35, + 0x20, 0x1c, 0x9d, 0xf4, 0xac, 0xd2, 0xe5, 0xfd, 0x48, 0x86, 0x2d, 0x64, + 0xfb, 0x02, 0x14, 0x49, 0x6d, 0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32, + 0xd1, 0xf9, 0x91, 0x20, 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: Modified r or s, e.g. by adding or subtracting the group order + // tcID: 131 + {SEC_OID_SHA1, + 131, + {0x30, 0x2c, 0x02, 0x14, 0xf1, 0x5e, 0xec, 0xd5, 0xb5, 0x2c, 0xec, 0xa2, + 0x8f, 0x8a, 0xda, 0x2d, 0x9c, 0x15, 0xf4, 0x19, 0x96, 0x44, 0x51, 0x99, + 0x02, 0x14, 0x49, 0x6d, 0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32, 0xd1, + 0xf9, 0x91, 0x20, 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: Modified r or s, e.g. by adding or subtracting the group order + // tcID: 132 + {SEC_OID_SHA1, + 132, + {0x30, 0x2d, 0x02, 0x15, 0xff, 0x55, 0x95, 0xda, 0x70, 0x40, 0x82, 0x6f, + 0x1e, 0xa9, 0xeb, 0x98, 0x92, 0xc8, 0x82, 0x07, 0x4e, 0xf1, 0xc7, 0x24, + 0xb6, 0x02, 0x14, 0x49, 0x6d, 0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32, + 0xd1, 0xf9, 0x91, 0x20, 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: Modified r or s, e.g. by adding or subtracting the group order + // tcID: 133 + {SEC_OID_SHA1, + 133, + {0x30, 0x2c, 0x02, 0x14, 0x0e, 0xa1, 0x13, 0x2a, 0x4a, 0xd3, 0x13, 0x5d, + 0x70, 0x75, 0x25, 0xd2, 0x63, 0xea, 0x0b, 0xe6, 0x69, 0xbb, 0xae, 0x67, + 0x02, 0x14, 0x49, 0x6d, 0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32, 0xd1, + 0xf9, 0x91, 0x20, 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: Modified r or s, e.g. by adding or subtracting the group order + // tcID: 134 + {SEC_OID_SHA1, + 134, + {0x30, 0x2d, 0x02, 0x15, 0xfe, 0x9c, 0x8a, 0xa1, 0xb6, 0x36, 0x31, 0xca, + 0xdf, 0xe3, 0x62, 0x0b, 0x53, 0x2d, 0x1a, 0x02, 0xb7, 0x79, 0xd2, 0x9b, + 0x05, 0x02, 0x14, 0x49, 0x6d, 0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32, + 0xd1, 0xf9, 0x91, 0x20, 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: Modified r or s, e.g. by adding or subtracting the group order + // tcID: 135 + {SEC_OID_SHA1, + 135, + {0x30, 0x2d, 0x02, 0x15, 0x01, 0xaa, 0x6a, 0x25, 0x8f, 0xbf, 0x7d, 0x90, + 0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37, 0x7d, 0xf8, 0xb1, 0x0e, 0x38, 0xdb, + 0x4a, 0x02, 0x14, 0x49, 0x6d, 0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32, + 0xd1, 0xf9, 0x91, 0x20, 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: Modified r or s, e.g. by adding or subtracting the group order + // tcID: 136 + {SEC_OID_SHA1, + 136, + {0x30, 0x2c, 0x02, 0x14, 0x55, 0x95, 0xda, 0x70, 0x40, 0x82, 0x6f, 0x1e, + 0xa9, 0xeb, 0x98, 0x92, 0xc8, 0x82, 0x07, 0x4e, 0xf1, 0xc7, 0x24, 0xb6, + 0x02, 0x14, 0x49, 0x6d, 0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35, 0x32, 0xd1, + 0xf9, 0x91, 0x20, 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: Modified r or s, e.g. by adding or subtracting the group order + // tcID: 137 + {SEC_OID_SHA1, + 137, + {0x30, 0x2e, 0x02, 0x15, 0x00, 0xaa, 0x6a, 0x25, 0x8f, 0xbf, 0x7d, 0x90, + 0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37, 0x7d, 0xf8, 0xb1, 0x0e, 0x38, 0xdb, + 0x4a, 0x02, 0x15, 0x01, 0x02, 0x78, 0x8a, 0xda, 0xc0, 0x47, 0x21, 0x73, + 0xf9, 0x5b, 0x86, 0xd0, 0xbb, 0xa3, 0xc7, 0xe9, 0xb3, 0x8a, 0xd5, 0xec}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: Modified r or s, e.g. by adding or subtracting the group order + // tcID: 138 + {SEC_OID_SHA1, + 138, + {0x30, 0x2d, 0x02, 0x15, 0x00, 0xaa, 0x6a, 0x25, 0x8f, 0xbf, 0x7d, 0x90, + 0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37, 0x7d, 0xf8, 0xb1, 0x0e, 0x38, 0xdb, + 0x4a, 0x02, 0x14, 0x90, 0x62, 0x19, 0x66, 0xab, 0xa5, 0xd8, 0xf6, 0x6c, + 0x48, 0x6c, 0x51, 0x84, 0xd3, 0xbe, 0xba, 0xc3, 0xa1, 0xc2, 0x8a}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: Modified r or s, e.g. by adding or subtracting the group order + // tcID: 139 + {SEC_OID_SHA1, + 139, + {0x30, 0x2d, 0x02, 0x15, 0x00, 0xaa, 0x6a, 0x25, 0x8f, 0xbf, 0x7d, 0x90, + 0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37, 0x7d, 0xf8, 0xb1, 0x0e, 0x38, 0xdb, + 0x4a, 0x02, 0x14, 0xb6, 0x92, 0xad, 0xdf, 0x4a, 0x09, 0x82, 0xca, 0xcd, + 0x2e, 0x06, 0x6e, 0xdf, 0xc4, 0x3c, 0xad, 0xc4, 0x69, 0xb3, 0xc5}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: Modified r or s, e.g. by adding or subtracting the group order + // tcID: 140 + {SEC_OID_SHA1, + 140, + {0x30, 0x2d, 0x02, 0x15, 0x00, 0xaa, 0x6a, 0x25, 0x8f, 0xbf, 0x7d, 0x90, + 0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37, 0x7d, 0xf8, 0xb1, 0x0e, 0x38, 0xdb, + 0x4a, 0x02, 0x14, 0x6f, 0x9d, 0xe6, 0x99, 0x54, 0x5a, 0x27, 0x09, 0x93, + 0xb7, 0x93, 0xae, 0x7b, 0x2c, 0x41, 0x45, 0x3c, 0x5e, 0x3d, 0x76}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: Modified r or s, e.g. by adding or subtracting the group order + // tcID: 141 + {SEC_OID_SHA1, + 141, + {0x30, 0x2e, 0x02, 0x15, 0x00, 0xaa, 0x6a, 0x25, 0x8f, 0xbf, 0x7d, 0x90, + 0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37, 0x7d, 0xf8, 0xb1, 0x0e, 0x38, 0xdb, + 0x4a, 0x02, 0x15, 0xfe, 0xfd, 0x87, 0x75, 0x25, 0x3f, 0xb8, 0xde, 0x8c, + 0x06, 0xa4, 0x79, 0x2f, 0x44, 0x5c, 0x38, 0x16, 0x4c, 0x75, 0x2a, 0x14}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: Modified r or s, e.g. by adding or subtracting the group order + // tcID: 142 + {SEC_OID_SHA1, + 142, + {0x30, 0x2e, 0x02, 0x15, 0x00, 0xaa, 0x6a, 0x25, 0x8f, 0xbf, 0x7d, 0x90, + 0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37, 0x7d, 0xf8, 0xb1, 0x0e, 0x38, 0xdb, + 0x4a, 0x02, 0x15, 0x01, 0x49, 0x6d, 0x52, 0x20, 0xb5, 0xf6, 0x7d, 0x35, + 0x32, 0xd1, 0xf9, 0x91, 0x20, 0x3b, 0xc3, 0x52, 0x3b, 0x96, 0x4c, 0x3b}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: Modified r or s, e.g. by adding or subtracting the group order + // tcID: 143 + {SEC_OID_SHA1, + 143, + {0x30, 0x2e, 0x02, 0x15, 0x00, 0xaa, 0x6a, 0x25, 0x8f, 0xbf, 0x7d, 0x90, + 0xe1, 0x56, 0x14, 0x67, 0x6d, 0x37, 0x7d, 0xf8, 0xb1, 0x0e, 0x38, 0xdb, + 0x4a, 0x02, 0x15, 0x00, 0xb6, 0x92, 0xad, 0xdf, 0x4a, 0x09, 0x82, 0xca, + 0xcd, 0x2e, 0x06, 0x6e, 0xdf, 0xc4, 0x3c, 0xad, 0xc4, 0x69, 0xb3, 0xc5}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 144 + {SEC_OID_SHA1, + 144, + {0x30, 0x1a, 0x02, 0x01, 0x00, 0x02, 0x15, 0xff, 0x46, 0xf4, + 0xc7, 0x45, 0xf5, 0xaf, 0x5b, 0xc1, 0x39, 0x76, 0x72, 0xc0, + 0x64, 0x97, 0xfb, 0x68, 0x88, 0x0b, 0x76, 0x4f}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 145 + {SEC_OID_SHA1, + 145, + {0x30, 0x06, 0x02, 0x01, 0x00, 0x02, 0x01, 0x00}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 146 + {SEC_OID_SHA1, + 146, + {0x30, 0x06, 0x02, 0x01, 0x00, 0x02, 0x01, 0x01}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 147 + {SEC_OID_SHA1, + 147, + {0x30, 0x06, 0x02, 0x01, 0x00, 0x02, 0x01, 0xff}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 148 + {SEC_OID_SHA1, + 148, + {0x30, 0x19, 0x02, 0x01, 0x00, 0x02, 0x14, 0x5c, 0x85, + 0x9c, 0x5d, 0x05, 0x28, 0x52, 0x1f, 0x63, 0x44, 0xc6, + 0x9f, 0xcd, 0xb4, 0x02, 0x4b, 0xbb, 0xfa, 0x44, 0xd8}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 149 + {SEC_OID_SHA1, + 149, + {0x30, 0x19, 0x02, 0x01, 0x00, 0x02, 0x14, 0x5c, 0x85, + 0x9c, 0x5d, 0x05, 0x28, 0x52, 0x1f, 0x63, 0x44, 0xc6, + 0x9f, 0xcd, 0xb4, 0x02, 0x4b, 0xbb, 0xfa, 0x44, 0xd9}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 150 + {SEC_OID_SHA1, + 150, + {0x30, 0x1a, 0x02, 0x01, 0x00, 0x02, 0x15, 0x00, 0xb9, 0x0b, + 0x38, 0xba, 0x0a, 0x50, 0xa4, 0x3e, 0xc6, 0x89, 0x8d, 0x3f, + 0x9b, 0x68, 0x04, 0x97, 0x77, 0xf4, 0x89, 0xb0}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 151 + {SEC_OID_SHA1, + 151, + {0x30, 0x1a, 0x02, 0x01, 0x00, 0x02, 0x15, 0x00, 0xb9, 0x0b, + 0x38, 0xba, 0x0a, 0x50, 0xa4, 0x3e, 0xc6, 0x89, 0x8d, 0x3f, + 0x9b, 0x68, 0x04, 0x97, 0x77, 0xf4, 0x89, 0xb1}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 152 + {SEC_OID_SHA1, + 152, + {0x30, 0x1a, 0x02, 0x01, 0x00, 0x02, 0x15, 0x00, 0xb9, 0x0b, + 0x38, 0xba, 0x0a, 0x50, 0xa4, 0x3e, 0xc6, 0x89, 0x8d, 0x3f, + 0x9b, 0x68, 0x04, 0x97, 0x77, 0xf4, 0x89, 0xb2}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 153 + {SEC_OID_SHA1, + 153, + {0x30, 0x1a, 0x02, 0x01, 0x00, 0x02, 0x15, 0x01, 0x00, 0x00, + 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, + 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 154 + {SEC_OID_SHA1, + 154, + {0x30, 0x81, 0x87, 0x02, 0x01, 0x00, 0x02, 0x81, 0x81, 0x00, 0xb3, 0x4c, + 0xe9, 0xc1, 0xe7, 0x82, 0x94, 0xd3, 0x25, 0x84, 0x73, 0x84, 0x20, 0x05, + 0xd2, 0xa4, 0x8c, 0x8c, 0x56, 0x6c, 0xfc, 0xa8, 0xf8, 0x4c, 0x06, 0x06, + 0xf2, 0x52, 0x9b, 0x59, 0xa6, 0xd3, 0x8a, 0xae, 0x07, 0x1b, 0x53, 0xbb, + 0x21, 0x67, 0xea, 0xa4, 0xfc, 0x3b, 0x01, 0xfe, 0x17, 0x6e, 0x78, 0x7e, + 0x48, 0x1b, 0x60, 0x37, 0xaa, 0xc6, 0x2c, 0xbc, 0x3d, 0x08, 0x97, 0x99, + 0x53, 0x6a, 0x86, 0x9f, 0xa8, 0xcd, 0xfe, 0xa1, 0xe8, 0xb1, 0xfd, 0x2d, + 0x1c, 0xd3, 0xa3, 0x03, 0x50, 0x85, 0x9a, 0x2c, 0xd6, 0xb3, 0xec, 0x2f, + 0x9b, 0xfb, 0xb6, 0x8b, 0xb1, 0x1b, 0x4b, 0xbe, 0x2a, 0xda, 0xa1, 0x8d, + 0x64, 0xa9, 0x36, 0x39, 0x54, 0x3a, 0xe5, 0xe1, 0x62, 0x93, 0xe3, 0x11, + 0xc0, 0xcf, 0x8c, 0x8d, 0x6e, 0x18, 0x0d, 0xf0, 0x5d, 0x08, 0xc2, 0xfd, + 0x2d, 0x93, 0xd5, 0x70, 0x75, 0x1f}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 155 + {SEC_OID_SHA1, + 155, + {0x30, 0x08, 0x02, 0x01, 0x00, 0x09, 0x03, 0x80, 0xfe, 0x01}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 156 + {SEC_OID_SHA1, + 156, + {0x30, 0x06, 0x02, 0x01, 0x00, 0x09, 0x01, 0x42}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 157 + {SEC_OID_SHA1, + 157, + {0x30, 0x1a, 0x02, 0x01, 0x01, 0x02, 0x15, 0xff, 0x46, 0xf4, + 0xc7, 0x45, 0xf5, 0xaf, 0x5b, 0xc1, 0x39, 0x76, 0x72, 0xc0, + 0x64, 0x97, 0xfb, 0x68, 0x88, 0x0b, 0x76, 0x4f}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 158 + {SEC_OID_SHA1, + 158, + {0x30, 0x06, 0x02, 0x01, 0x01, 0x02, 0x01, 0x00}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 159 + {SEC_OID_SHA1, + 159, + {0x30, 0x06, 0x02, 0x01, 0x01, 0x02, 0x01, 0x01}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 160 + {SEC_OID_SHA1, + 160, + {0x30, 0x06, 0x02, 0x01, 0x01, 0x02, 0x01, 0xff}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 161 + {SEC_OID_SHA1, + 161, + {0x30, 0x19, 0x02, 0x01, 0x01, 0x02, 0x14, 0x5c, 0x85, + 0x9c, 0x5d, 0x05, 0x28, 0x52, 0x1f, 0x63, 0x44, 0xc6, + 0x9f, 0xcd, 0xb4, 0x02, 0x4b, 0xbb, 0xfa, 0x44, 0xd8}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 162 + {SEC_OID_SHA1, + 162, + {0x30, 0x19, 0x02, 0x01, 0x01, 0x02, 0x14, 0x5c, 0x85, + 0x9c, 0x5d, 0x05, 0x28, 0x52, 0x1f, 0x63, 0x44, 0xc6, + 0x9f, 0xcd, 0xb4, 0x02, 0x4b, 0xbb, 0xfa, 0x44, 0xd9}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 163 + {SEC_OID_SHA1, + 163, + {0x30, 0x1a, 0x02, 0x01, 0x01, 0x02, 0x15, 0x00, 0xb9, 0x0b, + 0x38, 0xba, 0x0a, 0x50, 0xa4, 0x3e, 0xc6, 0x89, 0x8d, 0x3f, + 0x9b, 0x68, 0x04, 0x97, 0x77, 0xf4, 0x89, 0xb0}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 164 + {SEC_OID_SHA1, + 164, + {0x30, 0x1a, 0x02, 0x01, 0x01, 0x02, 0x15, 0x00, 0xb9, 0x0b, + 0x38, 0xba, 0x0a, 0x50, 0xa4, 0x3e, 0xc6, 0x89, 0x8d, 0x3f, + 0x9b, 0x68, 0x04, 0x97, 0x77, 0xf4, 0x89, 0xb1}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 165 + {SEC_OID_SHA1, + 165, + {0x30, 0x1a, 0x02, 0x01, 0x01, 0x02, 0x15, 0x00, 0xb9, 0x0b, + 0x38, 0xba, 0x0a, 0x50, 0xa4, 0x3e, 0xc6, 0x89, 0x8d, 0x3f, + 0x9b, 0x68, 0x04, 0x97, 0x77, 0xf4, 0x89, 0xb2}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 166 + {SEC_OID_SHA1, + 166, + {0x30, 0x1a, 0x02, 0x01, 0x01, 0x02, 0x15, 0x01, 0x00, 0x00, + 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, + 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 167 + {SEC_OID_SHA1, + 167, + {0x30, 0x81, 0x87, 0x02, 0x01, 0x01, 0x02, 0x81, 0x81, 0x00, 0xb3, 0x4c, + 0xe9, 0xc1, 0xe7, 0x82, 0x94, 0xd3, 0x25, 0x84, 0x73, 0x84, 0x20, 0x05, + 0xd2, 0xa4, 0x8c, 0x8c, 0x56, 0x6c, 0xfc, 0xa8, 0xf8, 0x4c, 0x06, 0x06, + 0xf2, 0x52, 0x9b, 0x59, 0xa6, 0xd3, 0x8a, 0xae, 0x07, 0x1b, 0x53, 0xbb, + 0x21, 0x67, 0xea, 0xa4, 0xfc, 0x3b, 0x01, 0xfe, 0x17, 0x6e, 0x78, 0x7e, + 0x48, 0x1b, 0x60, 0x37, 0xaa, 0xc6, 0x2c, 0xbc, 0x3d, 0x08, 0x97, 0x99, + 0x53, 0x6a, 0x86, 0x9f, 0xa8, 0xcd, 0xfe, 0xa1, 0xe8, 0xb1, 0xfd, 0x2d, + 0x1c, 0xd3, 0xa3, 0x03, 0x50, 0x85, 0x9a, 0x2c, 0xd6, 0xb3, 0xec, 0x2f, + 0x9b, 0xfb, 0xb6, 0x8b, 0xb1, 0x1b, 0x4b, 0xbe, 0x2a, 0xda, 0xa1, 0x8d, + 0x64, 0xa9, 0x36, 0x39, 0x54, 0x3a, 0xe5, 0xe1, 0x62, 0x93, 0xe3, 0x11, + 0xc0, 0xcf, 0x8c, 0x8d, 0x6e, 0x18, 0x0d, 0xf0, 0x5d, 0x08, 0xc2, 0xfd, + 0x2d, 0x93, 0xd5, 0x70, 0x75, 0x1f}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 168 + {SEC_OID_SHA1, + 168, + {0x30, 0x08, 0x02, 0x01, 0x01, 0x09, 0x03, 0x80, 0xfe, 0x01}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 169 + {SEC_OID_SHA1, + 169, + {0x30, 0x06, 0x02, 0x01, 0x01, 0x09, 0x01, 0x42}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 170 + {SEC_OID_SHA1, + 170, + {0x30, 0x1a, 0x02, 0x01, 0xff, 0x02, 0x15, 0xff, 0x46, 0xf4, + 0xc7, 0x45, 0xf5, 0xaf, 0x5b, 0xc1, 0x39, 0x76, 0x72, 0xc0, + 0x64, 0x97, 0xfb, 0x68, 0x88, 0x0b, 0x76, 0x4f}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 171 + {SEC_OID_SHA1, + 171, + {0x30, 0x06, 0x02, 0x01, 0xff, 0x02, 0x01, 0x00}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 172 + {SEC_OID_SHA1, + 172, + {0x30, 0x06, 0x02, 0x01, 0xff, 0x02, 0x01, 0x01}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 173 + {SEC_OID_SHA1, + 173, + {0x30, 0x06, 0x02, 0x01, 0xff, 0x02, 0x01, 0xff}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 174 + {SEC_OID_SHA1, + 174, + {0x30, 0x19, 0x02, 0x01, 0xff, 0x02, 0x14, 0x5c, 0x85, + 0x9c, 0x5d, 0x05, 0x28, 0x52, 0x1f, 0x63, 0x44, 0xc6, + 0x9f, 0xcd, 0xb4, 0x02, 0x4b, 0xbb, 0xfa, 0x44, 0xd8}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 175 + {SEC_OID_SHA1, + 175, + {0x30, 0x19, 0x02, 0x01, 0xff, 0x02, 0x14, 0x5c, 0x85, + 0x9c, 0x5d, 0x05, 0x28, 0x52, 0x1f, 0x63, 0x44, 0xc6, + 0x9f, 0xcd, 0xb4, 0x02, 0x4b, 0xbb, 0xfa, 0x44, 0xd9}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 176 + {SEC_OID_SHA1, + 176, + {0x30, 0x1a, 0x02, 0x01, 0xff, 0x02, 0x15, 0x00, 0xb9, 0x0b, + 0x38, 0xba, 0x0a, 0x50, 0xa4, 0x3e, 0xc6, 0x89, 0x8d, 0x3f, + 0x9b, 0x68, 0x04, 0x97, 0x77, 0xf4, 0x89, 0xb0}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 177 + {SEC_OID_SHA1, + 177, + {0x30, 0x1a, 0x02, 0x01, 0xff, 0x02, 0x15, 0x00, 0xb9, 0x0b, + 0x38, 0xba, 0x0a, 0x50, 0xa4, 0x3e, 0xc6, 0x89, 0x8d, 0x3f, + 0x9b, 0x68, 0x04, 0x97, 0x77, 0xf4, 0x89, 0xb1}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 178 + {SEC_OID_SHA1, + 178, + {0x30, 0x1a, 0x02, 0x01, 0xff, 0x02, 0x15, 0x00, 0xb9, 0x0b, + 0x38, 0xba, 0x0a, 0x50, 0xa4, 0x3e, 0xc6, 0x89, 0x8d, 0x3f, + 0x9b, 0x68, 0x04, 0x97, 0x77, 0xf4, 0x89, 0xb2}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 179 + {SEC_OID_SHA1, + 179, + {0x30, 0x1a, 0x02, 0x01, 0xff, 0x02, 0x15, 0x01, 0x00, 0x00, + 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, + 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 180 + {SEC_OID_SHA1, + 180, + {0x30, 0x81, 0x87, 0x02, 0x01, 0xff, 0x02, 0x81, 0x81, 0x00, 0xb3, 0x4c, + 0xe9, 0xc1, 0xe7, 0x82, 0x94, 0xd3, 0x25, 0x84, 0x73, 0x84, 0x20, 0x05, + 0xd2, 0xa4, 0x8c, 0x8c, 0x56, 0x6c, 0xfc, 0xa8, 0xf8, 0x4c, 0x06, 0x06, + 0xf2, 0x52, 0x9b, 0x59, 0xa6, 0xd3, 0x8a, 0xae, 0x07, 0x1b, 0x53, 0xbb, + 0x21, 0x67, 0xea, 0xa4, 0xfc, 0x3b, 0x01, 0xfe, 0x17, 0x6e, 0x78, 0x7e, + 0x48, 0x1b, 0x60, 0x37, 0xaa, 0xc6, 0x2c, 0xbc, 0x3d, 0x08, 0x97, 0x99, + 0x53, 0x6a, 0x86, 0x9f, 0xa8, 0xcd, 0xfe, 0xa1, 0xe8, 0xb1, 0xfd, 0x2d, + 0x1c, 0xd3, 0xa3, 0x03, 0x50, 0x85, 0x9a, 0x2c, 0xd6, 0xb3, 0xec, 0x2f, + 0x9b, 0xfb, 0xb6, 0x8b, 0xb1, 0x1b, 0x4b, 0xbe, 0x2a, 0xda, 0xa1, 0x8d, + 0x64, 0xa9, 0x36, 0x39, 0x54, 0x3a, 0xe5, 0xe1, 0x62, 0x93, 0xe3, 0x11, + 0xc0, 0xcf, 0x8c, 0x8d, 0x6e, 0x18, 0x0d, 0xf0, 0x5d, 0x08, 0xc2, 0xfd, + 0x2d, 0x93, 0xd5, 0x70, 0x75, 0x1f}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 181 + {SEC_OID_SHA1, + 181, + {0x30, 0x08, 0x02, 0x01, 0xff, 0x09, 0x03, 0x80, 0xfe, 0x01}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 182 + {SEC_OID_SHA1, + 182, + {0x30, 0x06, 0x02, 0x01, 0xff, 0x09, 0x01, 0x42}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 183 + {SEC_OID_SHA1, + 183, + {0x30, 0x2d, 0x02, 0x14, 0x5c, 0x85, 0x9c, 0x5d, 0x05, 0x28, 0x52, 0x1f, + 0x63, 0x44, 0xc6, 0x9f, 0xcd, 0xb4, 0x02, 0x4b, 0xbb, 0xfa, 0x44, 0xd8, + 0x02, 0x15, 0xff, 0x46, 0xf4, 0xc7, 0x45, 0xf5, 0xaf, 0x5b, 0xc1, 0x39, + 0x76, 0x72, 0xc0, 0x64, 0x97, 0xfb, 0x68, 0x88, 0x0b, 0x76, 0x4f}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 184 + {SEC_OID_SHA1, + 184, + {0x30, 0x19, 0x02, 0x14, 0x5c, 0x85, 0x9c, 0x5d, 0x05, + 0x28, 0x52, 0x1f, 0x63, 0x44, 0xc6, 0x9f, 0xcd, 0xb4, + 0x02, 0x4b, 0xbb, 0xfa, 0x44, 0xd8, 0x02, 0x01, 0x00}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 185 + {SEC_OID_SHA1, + 185, + {0x30, 0x19, 0x02, 0x14, 0x5c, 0x85, 0x9c, 0x5d, 0x05, + 0x28, 0x52, 0x1f, 0x63, 0x44, 0xc6, 0x9f, 0xcd, 0xb4, + 0x02, 0x4b, 0xbb, 0xfa, 0x44, 0xd8, 0x02, 0x01, 0x01}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 186 + {SEC_OID_SHA1, + 186, + {0x30, 0x19, 0x02, 0x14, 0x5c, 0x85, 0x9c, 0x5d, 0x05, + 0x28, 0x52, 0x1f, 0x63, 0x44, 0xc6, 0x9f, 0xcd, 0xb4, + 0x02, 0x4b, 0xbb, 0xfa, 0x44, 0xd8, 0x02, 0x01, 0xff}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 187 + {SEC_OID_SHA1, + 187, + {0x30, 0x2c, 0x02, 0x14, 0x5c, 0x85, 0x9c, 0x5d, 0x05, 0x28, 0x52, 0x1f, + 0x63, 0x44, 0xc6, 0x9f, 0xcd, 0xb4, 0x02, 0x4b, 0xbb, 0xfa, 0x44, 0xd8, + 0x02, 0x14, 0x5c, 0x85, 0x9c, 0x5d, 0x05, 0x28, 0x52, 0x1f, 0x63, 0x44, + 0xc6, 0x9f, 0xcd, 0xb4, 0x02, 0x4b, 0xbb, 0xfa, 0x44, 0xd8}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 188 + {SEC_OID_SHA1, + 188, + {0x30, 0x2c, 0x02, 0x14, 0x5c, 0x85, 0x9c, 0x5d, 0x05, 0x28, 0x52, 0x1f, + 0x63, 0x44, 0xc6, 0x9f, 0xcd, 0xb4, 0x02, 0x4b, 0xbb, 0xfa, 0x44, 0xd8, + 0x02, 0x14, 0x5c, 0x85, 0x9c, 0x5d, 0x05, 0x28, 0x52, 0x1f, 0x63, 0x44, + 0xc6, 0x9f, 0xcd, 0xb4, 0x02, 0x4b, 0xbb, 0xfa, 0x44, 0xd9}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 189 + {SEC_OID_SHA1, + 189, + {0x30, 0x2d, 0x02, 0x14, 0x5c, 0x85, 0x9c, 0x5d, 0x05, 0x28, 0x52, 0x1f, + 0x63, 0x44, 0xc6, 0x9f, 0xcd, 0xb4, 0x02, 0x4b, 0xbb, 0xfa, 0x44, 0xd8, + 0x02, 0x15, 0x00, 0xb9, 0x0b, 0x38, 0xba, 0x0a, 0x50, 0xa4, 0x3e, 0xc6, + 0x89, 0x8d, 0x3f, 0x9b, 0x68, 0x04, 0x97, 0x77, 0xf4, 0x89, 0xb0}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 190 + {SEC_OID_SHA1, + 190, + {0x30, 0x2d, 0x02, 0x14, 0x5c, 0x85, 0x9c, 0x5d, 0x05, 0x28, 0x52, 0x1f, + 0x63, 0x44, 0xc6, 0x9f, 0xcd, 0xb4, 0x02, 0x4b, 0xbb, 0xfa, 0x44, 0xd8, + 0x02, 0x15, 0x00, 0xb9, 0x0b, 0x38, 0xba, 0x0a, 0x50, 0xa4, 0x3e, 0xc6, + 0x89, 0x8d, 0x3f, 0x9b, 0x68, 0x04, 0x97, 0x77, 0xf4, 0x89, 0xb1}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 191 + {SEC_OID_SHA1, + 191, + {0x30, 0x2d, 0x02, 0x14, 0x5c, 0x85, 0x9c, 0x5d, 0x05, 0x28, 0x52, 0x1f, + 0x63, 0x44, 0xc6, 0x9f, 0xcd, 0xb4, 0x02, 0x4b, 0xbb, 0xfa, 0x44, 0xd8, + 0x02, 0x15, 0x00, 0xb9, 0x0b, 0x38, 0xba, 0x0a, 0x50, 0xa4, 0x3e, 0xc6, + 0x89, 0x8d, 0x3f, 0x9b, 0x68, 0x04, 0x97, 0x77, 0xf4, 0x89, 0xb2}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 192 + {SEC_OID_SHA1, + 192, + {0x30, 0x2d, 0x02, 0x14, 0x5c, 0x85, 0x9c, 0x5d, 0x05, 0x28, 0x52, 0x1f, + 0x63, 0x44, 0xc6, 0x9f, 0xcd, 0xb4, 0x02, 0x4b, 0xbb, 0xfa, 0x44, 0xd8, + 0x02, 0x15, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, + 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 193 + {SEC_OID_SHA1, + 193, + {0x30, 0x81, 0x9a, 0x02, 0x14, 0x5c, 0x85, 0x9c, 0x5d, 0x05, 0x28, 0x52, + 0x1f, 0x63, 0x44, 0xc6, 0x9f, 0xcd, 0xb4, 0x02, 0x4b, 0xbb, 0xfa, 0x44, + 0xd8, 0x02, 0x81, 0x81, 0x00, 0xb3, 0x4c, 0xe9, 0xc1, 0xe7, 0x82, 0x94, + 0xd3, 0x25, 0x84, 0x73, 0x84, 0x20, 0x05, 0xd2, 0xa4, 0x8c, 0x8c, 0x56, + 0x6c, 0xfc, 0xa8, 0xf8, 0x4c, 0x06, 0x06, 0xf2, 0x52, 0x9b, 0x59, 0xa6, + 0xd3, 0x8a, 0xae, 0x07, 0x1b, 0x53, 0xbb, 0x21, 0x67, 0xea, 0xa4, 0xfc, + 0x3b, 0x01, 0xfe, 0x17, 0x6e, 0x78, 0x7e, 0x48, 0x1b, 0x60, 0x37, 0xaa, + 0xc6, 0x2c, 0xbc, 0x3d, 0x08, 0x97, 0x99, 0x53, 0x6a, 0x86, 0x9f, 0xa8, + 0xcd, 0xfe, 0xa1, 0xe8, 0xb1, 0xfd, 0x2d, 0x1c, 0xd3, 0xa3, 0x03, 0x50, + 0x85, 0x9a, 0x2c, 0xd6, 0xb3, 0xec, 0x2f, 0x9b, 0xfb, 0xb6, 0x8b, 0xb1, + 0x1b, 0x4b, 0xbe, 0x2a, 0xda, 0xa1, 0x8d, 0x64, 0xa9, 0x36, 0x39, 0x54, + 0x3a, 0xe5, 0xe1, 0x62, 0x93, 0xe3, 0x11, 0xc0, 0xcf, 0x8c, 0x8d, 0x6e, + 0x18, 0x0d, 0xf0, 0x5d, 0x08, 0xc2, 0xfd, 0x2d, 0x93, 0xd5, 0x70, 0x75, + 0x1f}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 194 + {SEC_OID_SHA1, + 194, + {0x30, 0x1b, 0x02, 0x14, 0x5c, 0x85, 0x9c, 0x5d, 0x05, 0x28, + 0x52, 0x1f, 0x63, 0x44, 0xc6, 0x9f, 0xcd, 0xb4, 0x02, 0x4b, + 0xbb, 0xfa, 0x44, 0xd8, 0x09, 0x03, 0x80, 0xfe, 0x01}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 195 + {SEC_OID_SHA1, + 195, + {0x30, 0x19, 0x02, 0x14, 0x5c, 0x85, 0x9c, 0x5d, 0x05, + 0x28, 0x52, 0x1f, 0x63, 0x44, 0xc6, 0x9f, 0xcd, 0xb4, + 0x02, 0x4b, 0xbb, 0xfa, 0x44, 0xd8, 0x09, 0x01, 0x42}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 196 + {SEC_OID_SHA1, + 196, + {0x30, 0x2d, 0x02, 0x14, 0x5c, 0x85, 0x9c, 0x5d, 0x05, 0x28, 0x52, 0x1f, + 0x63, 0x44, 0xc6, 0x9f, 0xcd, 0xb4, 0x02, 0x4b, 0xbb, 0xfa, 0x44, 0xd9, + 0x02, 0x15, 0xff, 0x46, 0xf4, 0xc7, 0x45, 0xf5, 0xaf, 0x5b, 0xc1, 0x39, + 0x76, 0x72, 0xc0, 0x64, 0x97, 0xfb, 0x68, 0x88, 0x0b, 0x76, 0x4f}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 197 + {SEC_OID_SHA1, + 197, + {0x30, 0x19, 0x02, 0x14, 0x5c, 0x85, 0x9c, 0x5d, 0x05, + 0x28, 0x52, 0x1f, 0x63, 0x44, 0xc6, 0x9f, 0xcd, 0xb4, + 0x02, 0x4b, 0xbb, 0xfa, 0x44, 0xd9, 0x02, 0x01, 0x00}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 198 + {SEC_OID_SHA1, + 198, + {0x30, 0x19, 0x02, 0x14, 0x5c, 0x85, 0x9c, 0x5d, 0x05, + 0x28, 0x52, 0x1f, 0x63, 0x44, 0xc6, 0x9f, 0xcd, 0xb4, + 0x02, 0x4b, 0xbb, 0xfa, 0x44, 0xd9, 0x02, 0x01, 0x01}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 199 + {SEC_OID_SHA1, + 199, + {0x30, 0x19, 0x02, 0x14, 0x5c, 0x85, 0x9c, 0x5d, 0x05, + 0x28, 0x52, 0x1f, 0x63, 0x44, 0xc6, 0x9f, 0xcd, 0xb4, + 0x02, 0x4b, 0xbb, 0xfa, 0x44, 0xd9, 0x02, 0x01, 0xff}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 200 + {SEC_OID_SHA1, + 200, + {0x30, 0x2c, 0x02, 0x14, 0x5c, 0x85, 0x9c, 0x5d, 0x05, 0x28, 0x52, 0x1f, + 0x63, 0x44, 0xc6, 0x9f, 0xcd, 0xb4, 0x02, 0x4b, 0xbb, 0xfa, 0x44, 0xd9, + 0x02, 0x14, 0x5c, 0x85, 0x9c, 0x5d, 0x05, 0x28, 0x52, 0x1f, 0x63, 0x44, + 0xc6, 0x9f, 0xcd, 0xb4, 0x02, 0x4b, 0xbb, 0xfa, 0x44, 0xd8}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 201 + {SEC_OID_SHA1, + 201, + {0x30, 0x2c, 0x02, 0x14, 0x5c, 0x85, 0x9c, 0x5d, 0x05, 0x28, 0x52, 0x1f, + 0x63, 0x44, 0xc6, 0x9f, 0xcd, 0xb4, 0x02, 0x4b, 0xbb, 0xfa, 0x44, 0xd9, + 0x02, 0x14, 0x5c, 0x85, 0x9c, 0x5d, 0x05, 0x28, 0x52, 0x1f, 0x63, 0x44, + 0xc6, 0x9f, 0xcd, 0xb4, 0x02, 0x4b, 0xbb, 0xfa, 0x44, 0xd9}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 202 + {SEC_OID_SHA1, + 202, + {0x30, 0x2d, 0x02, 0x14, 0x5c, 0x85, 0x9c, 0x5d, 0x05, 0x28, 0x52, 0x1f, + 0x63, 0x44, 0xc6, 0x9f, 0xcd, 0xb4, 0x02, 0x4b, 0xbb, 0xfa, 0x44, 0xd9, + 0x02, 0x15, 0x00, 0xb9, 0x0b, 0x38, 0xba, 0x0a, 0x50, 0xa4, 0x3e, 0xc6, + 0x89, 0x8d, 0x3f, 0x9b, 0x68, 0x04, 0x97, 0x77, 0xf4, 0x89, 0xb0}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 203 + {SEC_OID_SHA1, + 203, + {0x30, 0x2d, 0x02, 0x14, 0x5c, 0x85, 0x9c, 0x5d, 0x05, 0x28, 0x52, 0x1f, + 0x63, 0x44, 0xc6, 0x9f, 0xcd, 0xb4, 0x02, 0x4b, 0xbb, 0xfa, 0x44, 0xd9, + 0x02, 0x15, 0x00, 0xb9, 0x0b, 0x38, 0xba, 0x0a, 0x50, 0xa4, 0x3e, 0xc6, + 0x89, 0x8d, 0x3f, 0x9b, 0x68, 0x04, 0x97, 0x77, 0xf4, 0x89, 0xb1}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 204 + {SEC_OID_SHA1, + 204, + {0x30, 0x2d, 0x02, 0x14, 0x5c, 0x85, 0x9c, 0x5d, 0x05, 0x28, 0x52, 0x1f, + 0x63, 0x44, 0xc6, 0x9f, 0xcd, 0xb4, 0x02, 0x4b, 0xbb, 0xfa, 0x44, 0xd9, + 0x02, 0x15, 0x00, 0xb9, 0x0b, 0x38, 0xba, 0x0a, 0x50, 0xa4, 0x3e, 0xc6, + 0x89, 0x8d, 0x3f, 0x9b, 0x68, 0x04, 0x97, 0x77, 0xf4, 0x89, 0xb2}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 205 + {SEC_OID_SHA1, + 205, + {0x30, 0x2d, 0x02, 0x14, 0x5c, 0x85, 0x9c, 0x5d, 0x05, 0x28, 0x52, 0x1f, + 0x63, 0x44, 0xc6, 0x9f, 0xcd, 0xb4, 0x02, 0x4b, 0xbb, 0xfa, 0x44, 0xd9, + 0x02, 0x15, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, + 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 206 + {SEC_OID_SHA1, + 206, + {0x30, 0x81, 0x9a, 0x02, 0x14, 0x5c, 0x85, 0x9c, 0x5d, 0x05, 0x28, 0x52, + 0x1f, 0x63, 0x44, 0xc6, 0x9f, 0xcd, 0xb4, 0x02, 0x4b, 0xbb, 0xfa, 0x44, + 0xd9, 0x02, 0x81, 0x81, 0x00, 0xb3, 0x4c, 0xe9, 0xc1, 0xe7, 0x82, 0x94, + 0xd3, 0x25, 0x84, 0x73, 0x84, 0x20, 0x05, 0xd2, 0xa4, 0x8c, 0x8c, 0x56, + 0x6c, 0xfc, 0xa8, 0xf8, 0x4c, 0x06, 0x06, 0xf2, 0x52, 0x9b, 0x59, 0xa6, + 0xd3, 0x8a, 0xae, 0x07, 0x1b, 0x53, 0xbb, 0x21, 0x67, 0xea, 0xa4, 0xfc, + 0x3b, 0x01, 0xfe, 0x17, 0x6e, 0x78, 0x7e, 0x48, 0x1b, 0x60, 0x37, 0xaa, + 0xc6, 0x2c, 0xbc, 0x3d, 0x08, 0x97, 0x99, 0x53, 0x6a, 0x86, 0x9f, 0xa8, + 0xcd, 0xfe, 0xa1, 0xe8, 0xb1, 0xfd, 0x2d, 0x1c, 0xd3, 0xa3, 0x03, 0x50, + 0x85, 0x9a, 0x2c, 0xd6, 0xb3, 0xec, 0x2f, 0x9b, 0xfb, 0xb6, 0x8b, 0xb1, + 0x1b, 0x4b, 0xbe, 0x2a, 0xda, 0xa1, 0x8d, 0x64, 0xa9, 0x36, 0x39, 0x54, + 0x3a, 0xe5, 0xe1, 0x62, 0x93, 0xe3, 0x11, 0xc0, 0xcf, 0x8c, 0x8d, 0x6e, + 0x18, 0x0d, 0xf0, 0x5d, 0x08, 0xc2, 0xfd, 0x2d, 0x93, 0xd5, 0x70, 0x75, + 0x1f}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 207 + {SEC_OID_SHA1, + 207, + {0x30, 0x1b, 0x02, 0x14, 0x5c, 0x85, 0x9c, 0x5d, 0x05, 0x28, + 0x52, 0x1f, 0x63, 0x44, 0xc6, 0x9f, 0xcd, 0xb4, 0x02, 0x4b, + 0xbb, 0xfa, 0x44, 0xd9, 0x09, 0x03, 0x80, 0xfe, 0x01}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 208 + {SEC_OID_SHA1, + 208, + {0x30, 0x19, 0x02, 0x14, 0x5c, 0x85, 0x9c, 0x5d, 0x05, + 0x28, 0x52, 0x1f, 0x63, 0x44, 0xc6, 0x9f, 0xcd, 0xb4, + 0x02, 0x4b, 0xbb, 0xfa, 0x44, 0xd9, 0x09, 0x01, 0x42}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 209 + {SEC_OID_SHA1, + 209, + {0x30, 0x2e, 0x02, 0x15, 0x00, 0xb9, 0x0b, 0x38, 0xba, 0x0a, 0x50, 0xa4, + 0x3e, 0xc6, 0x89, 0x8d, 0x3f, 0x9b, 0x68, 0x04, 0x97, 0x77, 0xf4, 0x89, + 0xb0, 0x02, 0x15, 0xff, 0x46, 0xf4, 0xc7, 0x45, 0xf5, 0xaf, 0x5b, 0xc1, + 0x39, 0x76, 0x72, 0xc0, 0x64, 0x97, 0xfb, 0x68, 0x88, 0x0b, 0x76, 0x4f}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 210 + {SEC_OID_SHA1, + 210, + {0x30, 0x1a, 0x02, 0x15, 0x00, 0xb9, 0x0b, 0x38, 0xba, 0x0a, + 0x50, 0xa4, 0x3e, 0xc6, 0x89, 0x8d, 0x3f, 0x9b, 0x68, 0x04, + 0x97, 0x77, 0xf4, 0x89, 0xb0, 0x02, 0x01, 0x00}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 211 + {SEC_OID_SHA1, + 211, + {0x30, 0x1a, 0x02, 0x15, 0x00, 0xb9, 0x0b, 0x38, 0xba, 0x0a, + 0x50, 0xa4, 0x3e, 0xc6, 0x89, 0x8d, 0x3f, 0x9b, 0x68, 0x04, + 0x97, 0x77, 0xf4, 0x89, 0xb0, 0x02, 0x01, 0x01}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 212 + {SEC_OID_SHA1, + 212, + {0x30, 0x1a, 0x02, 0x15, 0x00, 0xb9, 0x0b, 0x38, 0xba, 0x0a, + 0x50, 0xa4, 0x3e, 0xc6, 0x89, 0x8d, 0x3f, 0x9b, 0x68, 0x04, + 0x97, 0x77, 0xf4, 0x89, 0xb0, 0x02, 0x01, 0xff}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 213 + {SEC_OID_SHA1, + 213, + {0x30, 0x2d, 0x02, 0x15, 0x00, 0xb9, 0x0b, 0x38, 0xba, 0x0a, 0x50, 0xa4, + 0x3e, 0xc6, 0x89, 0x8d, 0x3f, 0x9b, 0x68, 0x04, 0x97, 0x77, 0xf4, 0x89, + 0xb0, 0x02, 0x14, 0x5c, 0x85, 0x9c, 0x5d, 0x05, 0x28, 0x52, 0x1f, 0x63, + 0x44, 0xc6, 0x9f, 0xcd, 0xb4, 0x02, 0x4b, 0xbb, 0xfa, 0x44, 0xd8}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 214 + {SEC_OID_SHA1, + 214, + {0x30, 0x2d, 0x02, 0x15, 0x00, 0xb9, 0x0b, 0x38, 0xba, 0x0a, 0x50, 0xa4, + 0x3e, 0xc6, 0x89, 0x8d, 0x3f, 0x9b, 0x68, 0x04, 0x97, 0x77, 0xf4, 0x89, + 0xb0, 0x02, 0x14, 0x5c, 0x85, 0x9c, 0x5d, 0x05, 0x28, 0x52, 0x1f, 0x63, + 0x44, 0xc6, 0x9f, 0xcd, 0xb4, 0x02, 0x4b, 0xbb, 0xfa, 0x44, 0xd9}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 215 + {SEC_OID_SHA1, + 215, + {0x30, 0x2e, 0x02, 0x15, 0x00, 0xb9, 0x0b, 0x38, 0xba, 0x0a, 0x50, 0xa4, + 0x3e, 0xc6, 0x89, 0x8d, 0x3f, 0x9b, 0x68, 0x04, 0x97, 0x77, 0xf4, 0x89, + 0xb0, 0x02, 0x15, 0x00, 0xb9, 0x0b, 0x38, 0xba, 0x0a, 0x50, 0xa4, 0x3e, + 0xc6, 0x89, 0x8d, 0x3f, 0x9b, 0x68, 0x04, 0x97, 0x77, 0xf4, 0x89, 0xb0}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 216 + {SEC_OID_SHA1, + 216, + {0x30, 0x2e, 0x02, 0x15, 0x00, 0xb9, 0x0b, 0x38, 0xba, 0x0a, 0x50, 0xa4, + 0x3e, 0xc6, 0x89, 0x8d, 0x3f, 0x9b, 0x68, 0x04, 0x97, 0x77, 0xf4, 0x89, + 0xb0, 0x02, 0x15, 0x00, 0xb9, 0x0b, 0x38, 0xba, 0x0a, 0x50, 0xa4, 0x3e, + 0xc6, 0x89, 0x8d, 0x3f, 0x9b, 0x68, 0x04, 0x97, 0x77, 0xf4, 0x89, 0xb1}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 217 + {SEC_OID_SHA1, + 217, + {0x30, 0x2e, 0x02, 0x15, 0x00, 0xb9, 0x0b, 0x38, 0xba, 0x0a, 0x50, 0xa4, + 0x3e, 0xc6, 0x89, 0x8d, 0x3f, 0x9b, 0x68, 0x04, 0x97, 0x77, 0xf4, 0x89, + 0xb0, 0x02, 0x15, 0x00, 0xb9, 0x0b, 0x38, 0xba, 0x0a, 0x50, 0xa4, 0x3e, + 0xc6, 0x89, 0x8d, 0x3f, 0x9b, 0x68, 0x04, 0x97, 0x77, 0xf4, 0x89, 0xb2}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 218 + {SEC_OID_SHA1, + 218, + {0x30, 0x2e, 0x02, 0x15, 0x00, 0xb9, 0x0b, 0x38, 0xba, 0x0a, 0x50, 0xa4, + 0x3e, 0xc6, 0x89, 0x8d, 0x3f, 0x9b, 0x68, 0x04, 0x97, 0x77, 0xf4, 0x89, + 0xb0, 0x02, 0x15, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, + 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 219 + {SEC_OID_SHA1, + 219, + {0x30, 0x81, 0x9b, 0x02, 0x15, 0x00, 0xb9, 0x0b, 0x38, 0xba, 0x0a, 0x50, + 0xa4, 0x3e, 0xc6, 0x89, 0x8d, 0x3f, 0x9b, 0x68, 0x04, 0x97, 0x77, 0xf4, + 0x89, 0xb0, 0x02, 0x81, 0x81, 0x00, 0xb3, 0x4c, 0xe9, 0xc1, 0xe7, 0x82, + 0x94, 0xd3, 0x25, 0x84, 0x73, 0x84, 0x20, 0x05, 0xd2, 0xa4, 0x8c, 0x8c, + 0x56, 0x6c, 0xfc, 0xa8, 0xf8, 0x4c, 0x06, 0x06, 0xf2, 0x52, 0x9b, 0x59, + 0xa6, 0xd3, 0x8a, 0xae, 0x07, 0x1b, 0x53, 0xbb, 0x21, 0x67, 0xea, 0xa4, + 0xfc, 0x3b, 0x01, 0xfe, 0x17, 0x6e, 0x78, 0x7e, 0x48, 0x1b, 0x60, 0x37, + 0xaa, 0xc6, 0x2c, 0xbc, 0x3d, 0x08, 0x97, 0x99, 0x53, 0x6a, 0x86, 0x9f, + 0xa8, 0xcd, 0xfe, 0xa1, 0xe8, 0xb1, 0xfd, 0x2d, 0x1c, 0xd3, 0xa3, 0x03, + 0x50, 0x85, 0x9a, 0x2c, 0xd6, 0xb3, 0xec, 0x2f, 0x9b, 0xfb, 0xb6, 0x8b, + 0xb1, 0x1b, 0x4b, 0xbe, 0x2a, 0xda, 0xa1, 0x8d, 0x64, 0xa9, 0x36, 0x39, + 0x54, 0x3a, 0xe5, 0xe1, 0x62, 0x93, 0xe3, 0x11, 0xc0, 0xcf, 0x8c, 0x8d, + 0x6e, 0x18, 0x0d, 0xf0, 0x5d, 0x08, 0xc2, 0xfd, 0x2d, 0x93, 0xd5, 0x70, + 0x75, 0x1f}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 220 + {SEC_OID_SHA1, + 220, + {0x30, 0x1c, 0x02, 0x15, 0x00, 0xb9, 0x0b, 0x38, 0xba, 0x0a, + 0x50, 0xa4, 0x3e, 0xc6, 0x89, 0x8d, 0x3f, 0x9b, 0x68, 0x04, + 0x97, 0x77, 0xf4, 0x89, 0xb0, 0x09, 0x03, 0x80, 0xfe, 0x01}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 221 + {SEC_OID_SHA1, + 221, + {0x30, 0x1a, 0x02, 0x15, 0x00, 0xb9, 0x0b, 0x38, 0xba, 0x0a, + 0x50, 0xa4, 0x3e, 0xc6, 0x89, 0x8d, 0x3f, 0x9b, 0x68, 0x04, + 0x97, 0x77, 0xf4, 0x89, 0xb0, 0x09, 0x01, 0x42}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 222 + {SEC_OID_SHA1, + 222, + {0x30, 0x2e, 0x02, 0x15, 0x00, 0xb9, 0x0b, 0x38, 0xba, 0x0a, 0x50, 0xa4, + 0x3e, 0xc6, 0x89, 0x8d, 0x3f, 0x9b, 0x68, 0x04, 0x97, 0x77, 0xf4, 0x89, + 0xb1, 0x02, 0x15, 0xff, 0x46, 0xf4, 0xc7, 0x45, 0xf5, 0xaf, 0x5b, 0xc1, + 0x39, 0x76, 0x72, 0xc0, 0x64, 0x97, 0xfb, 0x68, 0x88, 0x0b, 0x76, 0x4f}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 223 + {SEC_OID_SHA1, + 223, + {0x30, 0x1a, 0x02, 0x15, 0x00, 0xb9, 0x0b, 0x38, 0xba, 0x0a, + 0x50, 0xa4, 0x3e, 0xc6, 0x89, 0x8d, 0x3f, 0x9b, 0x68, 0x04, + 0x97, 0x77, 0xf4, 0x89, 0xb1, 0x02, 0x01, 0x00}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 224 + {SEC_OID_SHA1, + 224, + {0x30, 0x1a, 0x02, 0x15, 0x00, 0xb9, 0x0b, 0x38, 0xba, 0x0a, + 0x50, 0xa4, 0x3e, 0xc6, 0x89, 0x8d, 0x3f, 0x9b, 0x68, 0x04, + 0x97, 0x77, 0xf4, 0x89, 0xb1, 0x02, 0x01, 0x01}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 225 + {SEC_OID_SHA1, + 225, + {0x30, 0x1a, 0x02, 0x15, 0x00, 0xb9, 0x0b, 0x38, 0xba, 0x0a, + 0x50, 0xa4, 0x3e, 0xc6, 0x89, 0x8d, 0x3f, 0x9b, 0x68, 0x04, + 0x97, 0x77, 0xf4, 0x89, 0xb1, 0x02, 0x01, 0xff}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 226 + {SEC_OID_SHA1, + 226, + {0x30, 0x2d, 0x02, 0x15, 0x00, 0xb9, 0x0b, 0x38, 0xba, 0x0a, 0x50, 0xa4, + 0x3e, 0xc6, 0x89, 0x8d, 0x3f, 0x9b, 0x68, 0x04, 0x97, 0x77, 0xf4, 0x89, + 0xb1, 0x02, 0x14, 0x5c, 0x85, 0x9c, 0x5d, 0x05, 0x28, 0x52, 0x1f, 0x63, + 0x44, 0xc6, 0x9f, 0xcd, 0xb4, 0x02, 0x4b, 0xbb, 0xfa, 0x44, 0xd8}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 227 + {SEC_OID_SHA1, + 227, + {0x30, 0x2d, 0x02, 0x15, 0x00, 0xb9, 0x0b, 0x38, 0xba, 0x0a, 0x50, 0xa4, + 0x3e, 0xc6, 0x89, 0x8d, 0x3f, 0x9b, 0x68, 0x04, 0x97, 0x77, 0xf4, 0x89, + 0xb1, 0x02, 0x14, 0x5c, 0x85, 0x9c, 0x5d, 0x05, 0x28, 0x52, 0x1f, 0x63, + 0x44, 0xc6, 0x9f, 0xcd, 0xb4, 0x02, 0x4b, 0xbb, 0xfa, 0x44, 0xd9}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 228 + {SEC_OID_SHA1, + 228, + {0x30, 0x2e, 0x02, 0x15, 0x00, 0xb9, 0x0b, 0x38, 0xba, 0x0a, 0x50, 0xa4, + 0x3e, 0xc6, 0x89, 0x8d, 0x3f, 0x9b, 0x68, 0x04, 0x97, 0x77, 0xf4, 0x89, + 0xb1, 0x02, 0x15, 0x00, 0xb9, 0x0b, 0x38, 0xba, 0x0a, 0x50, 0xa4, 0x3e, + 0xc6, 0x89, 0x8d, 0x3f, 0x9b, 0x68, 0x04, 0x97, 0x77, 0xf4, 0x89, 0xb0}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 229 + {SEC_OID_SHA1, + 229, + {0x30, 0x2e, 0x02, 0x15, 0x00, 0xb9, 0x0b, 0x38, 0xba, 0x0a, 0x50, 0xa4, + 0x3e, 0xc6, 0x89, 0x8d, 0x3f, 0x9b, 0x68, 0x04, 0x97, 0x77, 0xf4, 0x89, + 0xb1, 0x02, 0x15, 0x00, 0xb9, 0x0b, 0x38, 0xba, 0x0a, 0x50, 0xa4, 0x3e, + 0xc6, 0x89, 0x8d, 0x3f, 0x9b, 0x68, 0x04, 0x97, 0x77, 0xf4, 0x89, 0xb1}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 230 + {SEC_OID_SHA1, + 230, + {0x30, 0x2e, 0x02, 0x15, 0x00, 0xb9, 0x0b, 0x38, 0xba, 0x0a, 0x50, 0xa4, + 0x3e, 0xc6, 0x89, 0x8d, 0x3f, 0x9b, 0x68, 0x04, 0x97, 0x77, 0xf4, 0x89, + 0xb1, 0x02, 0x15, 0x00, 0xb9, 0x0b, 0x38, 0xba, 0x0a, 0x50, 0xa4, 0x3e, + 0xc6, 0x89, 0x8d, 0x3f, 0x9b, 0x68, 0x04, 0x97, 0x77, 0xf4, 0x89, 0xb2}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 231 + {SEC_OID_SHA1, + 231, + {0x30, 0x2e, 0x02, 0x15, 0x00, 0xb9, 0x0b, 0x38, 0xba, 0x0a, 0x50, 0xa4, + 0x3e, 0xc6, 0x89, 0x8d, 0x3f, 0x9b, 0x68, 0x04, 0x97, 0x77, 0xf4, 0x89, + 0xb1, 0x02, 0x15, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, + 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 232 + {SEC_OID_SHA1, + 232, + {0x30, 0x81, 0x9b, 0x02, 0x15, 0x00, 0xb9, 0x0b, 0x38, 0xba, 0x0a, 0x50, + 0xa4, 0x3e, 0xc6, 0x89, 0x8d, 0x3f, 0x9b, 0x68, 0x04, 0x97, 0x77, 0xf4, + 0x89, 0xb1, 0x02, 0x81, 0x81, 0x00, 0xb3, 0x4c, 0xe9, 0xc1, 0xe7, 0x82, + 0x94, 0xd3, 0x25, 0x84, 0x73, 0x84, 0x20, 0x05, 0xd2, 0xa4, 0x8c, 0x8c, + 0x56, 0x6c, 0xfc, 0xa8, 0xf8, 0x4c, 0x06, 0x06, 0xf2, 0x52, 0x9b, 0x59, + 0xa6, 0xd3, 0x8a, 0xae, 0x07, 0x1b, 0x53, 0xbb, 0x21, 0x67, 0xea, 0xa4, + 0xfc, 0x3b, 0x01, 0xfe, 0x17, 0x6e, 0x78, 0x7e, 0x48, 0x1b, 0x60, 0x37, + 0xaa, 0xc6, 0x2c, 0xbc, 0x3d, 0x08, 0x97, 0x99, 0x53, 0x6a, 0x86, 0x9f, + 0xa8, 0xcd, 0xfe, 0xa1, 0xe8, 0xb1, 0xfd, 0x2d, 0x1c, 0xd3, 0xa3, 0x03, + 0x50, 0x85, 0x9a, 0x2c, 0xd6, 0xb3, 0xec, 0x2f, 0x9b, 0xfb, 0xb6, 0x8b, + 0xb1, 0x1b, 0x4b, 0xbe, 0x2a, 0xda, 0xa1, 0x8d, 0x64, 0xa9, 0x36, 0x39, + 0x54, 0x3a, 0xe5, 0xe1, 0x62, 0x93, 0xe3, 0x11, 0xc0, 0xcf, 0x8c, 0x8d, + 0x6e, 0x18, 0x0d, 0xf0, 0x5d, 0x08, 0xc2, 0xfd, 0x2d, 0x93, 0xd5, 0x70, + 0x75, 0x1f}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 233 + {SEC_OID_SHA1, + 233, + {0x30, 0x1c, 0x02, 0x15, 0x00, 0xb9, 0x0b, 0x38, 0xba, 0x0a, + 0x50, 0xa4, 0x3e, 0xc6, 0x89, 0x8d, 0x3f, 0x9b, 0x68, 0x04, + 0x97, 0x77, 0xf4, 0x89, 0xb1, 0x09, 0x03, 0x80, 0xfe, 0x01}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 234 + {SEC_OID_SHA1, + 234, + {0x30, 0x1a, 0x02, 0x15, 0x00, 0xb9, 0x0b, 0x38, 0xba, 0x0a, + 0x50, 0xa4, 0x3e, 0xc6, 0x89, 0x8d, 0x3f, 0x9b, 0x68, 0x04, + 0x97, 0x77, 0xf4, 0x89, 0xb1, 0x09, 0x01, 0x42}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 235 + {SEC_OID_SHA1, + 235, + {0x30, 0x2e, 0x02, 0x15, 0x00, 0xb9, 0x0b, 0x38, 0xba, 0x0a, 0x50, 0xa4, + 0x3e, 0xc6, 0x89, 0x8d, 0x3f, 0x9b, 0x68, 0x04, 0x97, 0x77, 0xf4, 0x89, + 0xb2, 0x02, 0x15, 0xff, 0x46, 0xf4, 0xc7, 0x45, 0xf5, 0xaf, 0x5b, 0xc1, + 0x39, 0x76, 0x72, 0xc0, 0x64, 0x97, 0xfb, 0x68, 0x88, 0x0b, 0x76, 0x4f}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 236 + {SEC_OID_SHA1, + 236, + {0x30, 0x1a, 0x02, 0x15, 0x00, 0xb9, 0x0b, 0x38, 0xba, 0x0a, + 0x50, 0xa4, 0x3e, 0xc6, 0x89, 0x8d, 0x3f, 0x9b, 0x68, 0x04, + 0x97, 0x77, 0xf4, 0x89, 0xb2, 0x02, 0x01, 0x00}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 237 + {SEC_OID_SHA1, + 237, + {0x30, 0x1a, 0x02, 0x15, 0x00, 0xb9, 0x0b, 0x38, 0xba, 0x0a, + 0x50, 0xa4, 0x3e, 0xc6, 0x89, 0x8d, 0x3f, 0x9b, 0x68, 0x04, + 0x97, 0x77, 0xf4, 0x89, 0xb2, 0x02, 0x01, 0x01}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 238 + {SEC_OID_SHA1, + 238, + {0x30, 0x1a, 0x02, 0x15, 0x00, 0xb9, 0x0b, 0x38, 0xba, 0x0a, + 0x50, 0xa4, 0x3e, 0xc6, 0x89, 0x8d, 0x3f, 0x9b, 0x68, 0x04, + 0x97, 0x77, 0xf4, 0x89, 0xb2, 0x02, 0x01, 0xff}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 239 + {SEC_OID_SHA1, + 239, + {0x30, 0x2d, 0x02, 0x15, 0x00, 0xb9, 0x0b, 0x38, 0xba, 0x0a, 0x50, 0xa4, + 0x3e, 0xc6, 0x89, 0x8d, 0x3f, 0x9b, 0x68, 0x04, 0x97, 0x77, 0xf4, 0x89, + 0xb2, 0x02, 0x14, 0x5c, 0x85, 0x9c, 0x5d, 0x05, 0x28, 0x52, 0x1f, 0x63, + 0x44, 0xc6, 0x9f, 0xcd, 0xb4, 0x02, 0x4b, 0xbb, 0xfa, 0x44, 0xd8}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 240 + {SEC_OID_SHA1, + 240, + {0x30, 0x2d, 0x02, 0x15, 0x00, 0xb9, 0x0b, 0x38, 0xba, 0x0a, 0x50, 0xa4, + 0x3e, 0xc6, 0x89, 0x8d, 0x3f, 0x9b, 0x68, 0x04, 0x97, 0x77, 0xf4, 0x89, + 0xb2, 0x02, 0x14, 0x5c, 0x85, 0x9c, 0x5d, 0x05, 0x28, 0x52, 0x1f, 0x63, + 0x44, 0xc6, 0x9f, 0xcd, 0xb4, 0x02, 0x4b, 0xbb, 0xfa, 0x44, 0xd9}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 241 + {SEC_OID_SHA1, + 241, + {0x30, 0x2e, 0x02, 0x15, 0x00, 0xb9, 0x0b, 0x38, 0xba, 0x0a, 0x50, 0xa4, + 0x3e, 0xc6, 0x89, 0x8d, 0x3f, 0x9b, 0x68, 0x04, 0x97, 0x77, 0xf4, 0x89, + 0xb2, 0x02, 0x15, 0x00, 0xb9, 0x0b, 0x38, 0xba, 0x0a, 0x50, 0xa4, 0x3e, + 0xc6, 0x89, 0x8d, 0x3f, 0x9b, 0x68, 0x04, 0x97, 0x77, 0xf4, 0x89, 0xb0}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 242 + {SEC_OID_SHA1, + 242, + {0x30, 0x2e, 0x02, 0x15, 0x00, 0xb9, 0x0b, 0x38, 0xba, 0x0a, 0x50, 0xa4, + 0x3e, 0xc6, 0x89, 0x8d, 0x3f, 0x9b, 0x68, 0x04, 0x97, 0x77, 0xf4, 0x89, + 0xb2, 0x02, 0x15, 0x00, 0xb9, 0x0b, 0x38, 0xba, 0x0a, 0x50, 0xa4, 0x3e, + 0xc6, 0x89, 0x8d, 0x3f, 0x9b, 0x68, 0x04, 0x97, 0x77, 0xf4, 0x89, 0xb1}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 243 + {SEC_OID_SHA1, + 243, + {0x30, 0x2e, 0x02, 0x15, 0x00, 0xb9, 0x0b, 0x38, 0xba, 0x0a, 0x50, 0xa4, + 0x3e, 0xc6, 0x89, 0x8d, 0x3f, 0x9b, 0x68, 0x04, 0x97, 0x77, 0xf4, 0x89, + 0xb2, 0x02, 0x15, 0x00, 0xb9, 0x0b, 0x38, 0xba, 0x0a, 0x50, 0xa4, 0x3e, + 0xc6, 0x89, 0x8d, 0x3f, 0x9b, 0x68, 0x04, 0x97, 0x77, 0xf4, 0x89, 0xb2}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 244 + {SEC_OID_SHA1, + 244, + {0x30, 0x2e, 0x02, 0x15, 0x00, 0xb9, 0x0b, 0x38, 0xba, 0x0a, 0x50, 0xa4, + 0x3e, 0xc6, 0x89, 0x8d, 0x3f, 0x9b, 0x68, 0x04, 0x97, 0x77, 0xf4, 0x89, + 0xb2, 0x02, 0x15, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, + 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 245 + {SEC_OID_SHA1, + 245, + {0x30, 0x81, 0x9b, 0x02, 0x15, 0x00, 0xb9, 0x0b, 0x38, 0xba, 0x0a, 0x50, + 0xa4, 0x3e, 0xc6, 0x89, 0x8d, 0x3f, 0x9b, 0x68, 0x04, 0x97, 0x77, 0xf4, + 0x89, 0xb2, 0x02, 0x81, 0x81, 0x00, 0xb3, 0x4c, 0xe9, 0xc1, 0xe7, 0x82, + 0x94, 0xd3, 0x25, 0x84, 0x73, 0x84, 0x20, 0x05, 0xd2, 0xa4, 0x8c, 0x8c, + 0x56, 0x6c, 0xfc, 0xa8, 0xf8, 0x4c, 0x06, 0x06, 0xf2, 0x52, 0x9b, 0x59, + 0xa6, 0xd3, 0x8a, 0xae, 0x07, 0x1b, 0x53, 0xbb, 0x21, 0x67, 0xea, 0xa4, + 0xfc, 0x3b, 0x01, 0xfe, 0x17, 0x6e, 0x78, 0x7e, 0x48, 0x1b, 0x60, 0x37, + 0xaa, 0xc6, 0x2c, 0xbc, 0x3d, 0x08, 0x97, 0x99, 0x53, 0x6a, 0x86, 0x9f, + 0xa8, 0xcd, 0xfe, 0xa1, 0xe8, 0xb1, 0xfd, 0x2d, 0x1c, 0xd3, 0xa3, 0x03, + 0x50, 0x85, 0x9a, 0x2c, 0xd6, 0xb3, 0xec, 0x2f, 0x9b, 0xfb, 0xb6, 0x8b, + 0xb1, 0x1b, 0x4b, 0xbe, 0x2a, 0xda, 0xa1, 0x8d, 0x64, 0xa9, 0x36, 0x39, + 0x54, 0x3a, 0xe5, 0xe1, 0x62, 0x93, 0xe3, 0x11, 0xc0, 0xcf, 0x8c, 0x8d, + 0x6e, 0x18, 0x0d, 0xf0, 0x5d, 0x08, 0xc2, 0xfd, 0x2d, 0x93, 0xd5, 0x70, + 0x75, 0x1f}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 246 + {SEC_OID_SHA1, + 246, + {0x30, 0x1c, 0x02, 0x15, 0x00, 0xb9, 0x0b, 0x38, 0xba, 0x0a, + 0x50, 0xa4, 0x3e, 0xc6, 0x89, 0x8d, 0x3f, 0x9b, 0x68, 0x04, + 0x97, 0x77, 0xf4, 0x89, 0xb2, 0x09, 0x03, 0x80, 0xfe, 0x01}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 247 + {SEC_OID_SHA1, + 247, + {0x30, 0x1a, 0x02, 0x15, 0x00, 0xb9, 0x0b, 0x38, 0xba, 0x0a, + 0x50, 0xa4, 0x3e, 0xc6, 0x89, 0x8d, 0x3f, 0x9b, 0x68, 0x04, + 0x97, 0x77, 0xf4, 0x89, 0xb2, 0x09, 0x01, 0x42}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 248 + {SEC_OID_SHA1, + 248, + {0x30, 0x2e, 0x02, 0x15, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, + 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, + 0x00, 0x02, 0x15, 0xff, 0x46, 0xf4, 0xc7, 0x45, 0xf5, 0xaf, 0x5b, 0xc1, + 0x39, 0x76, 0x72, 0xc0, 0x64, 0x97, 0xfb, 0x68, 0x88, 0x0b, 0x76, 0x4f}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 249 + {SEC_OID_SHA1, + 249, + {0x30, 0x1a, 0x02, 0x15, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, + 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, + 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, 0x01, 0x00}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 250 + {SEC_OID_SHA1, + 250, + {0x30, 0x1a, 0x02, 0x15, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, + 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, + 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, 0x01, 0x01}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 251 + {SEC_OID_SHA1, + 251, + {0x30, 0x1a, 0x02, 0x15, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, + 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, + 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, 0x01, 0xff}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 252 + {SEC_OID_SHA1, + 252, + {0x30, 0x2d, 0x02, 0x15, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, + 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, + 0x00, 0x02, 0x14, 0x5c, 0x85, 0x9c, 0x5d, 0x05, 0x28, 0x52, 0x1f, 0x63, + 0x44, 0xc6, 0x9f, 0xcd, 0xb4, 0x02, 0x4b, 0xbb, 0xfa, 0x44, 0xd8}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 253 + {SEC_OID_SHA1, + 253, + {0x30, 0x2d, 0x02, 0x15, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, + 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, + 0x00, 0x02, 0x14, 0x5c, 0x85, 0x9c, 0x5d, 0x05, 0x28, 0x52, 0x1f, 0x63, + 0x44, 0xc6, 0x9f, 0xcd, 0xb4, 0x02, 0x4b, 0xbb, 0xfa, 0x44, 0xd9}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 254 + {SEC_OID_SHA1, + 254, + {0x30, 0x2e, 0x02, 0x15, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, + 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, + 0x00, 0x02, 0x15, 0x00, 0xb9, 0x0b, 0x38, 0xba, 0x0a, 0x50, 0xa4, 0x3e, + 0xc6, 0x89, 0x8d, 0x3f, 0x9b, 0x68, 0x04, 0x97, 0x77, 0xf4, 0x89, 0xb0}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 255 + {SEC_OID_SHA1, + 255, + {0x30, 0x2e, 0x02, 0x15, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, + 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, + 0x00, 0x02, 0x15, 0x00, 0xb9, 0x0b, 0x38, 0xba, 0x0a, 0x50, 0xa4, 0x3e, + 0xc6, 0x89, 0x8d, 0x3f, 0x9b, 0x68, 0x04, 0x97, 0x77, 0xf4, 0x89, 0xb1}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 256 + {SEC_OID_SHA1, + 256, + {0x30, 0x2e, 0x02, 0x15, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, + 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, + 0x00, 0x02, 0x15, 0x00, 0xb9, 0x0b, 0x38, 0xba, 0x0a, 0x50, 0xa4, 0x3e, + 0xc6, 0x89, 0x8d, 0x3f, 0x9b, 0x68, 0x04, 0x97, 0x77, 0xf4, 0x89, 0xb2}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 257 + {SEC_OID_SHA1, + 257, + {0x30, 0x2e, 0x02, 0x15, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, + 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, + 0x00, 0x02, 0x15, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, + 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 258 + {SEC_OID_SHA1, + 258, + {0x30, 0x81, 0x9b, 0x02, 0x15, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, + 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, + 0x00, 0x00, 0x02, 0x81, 0x81, 0x00, 0xb3, 0x4c, 0xe9, 0xc1, 0xe7, 0x82, + 0x94, 0xd3, 0x25, 0x84, 0x73, 0x84, 0x20, 0x05, 0xd2, 0xa4, 0x8c, 0x8c, + 0x56, 0x6c, 0xfc, 0xa8, 0xf8, 0x4c, 0x06, 0x06, 0xf2, 0x52, 0x9b, 0x59, + 0xa6, 0xd3, 0x8a, 0xae, 0x07, 0x1b, 0x53, 0xbb, 0x21, 0x67, 0xea, 0xa4, + 0xfc, 0x3b, 0x01, 0xfe, 0x17, 0x6e, 0x78, 0x7e, 0x48, 0x1b, 0x60, 0x37, + 0xaa, 0xc6, 0x2c, 0xbc, 0x3d, 0x08, 0x97, 0x99, 0x53, 0x6a, 0x86, 0x9f, + 0xa8, 0xcd, 0xfe, 0xa1, 0xe8, 0xb1, 0xfd, 0x2d, 0x1c, 0xd3, 0xa3, 0x03, + 0x50, 0x85, 0x9a, 0x2c, 0xd6, 0xb3, 0xec, 0x2f, 0x9b, 0xfb, 0xb6, 0x8b, + 0xb1, 0x1b, 0x4b, 0xbe, 0x2a, 0xda, 0xa1, 0x8d, 0x64, 0xa9, 0x36, 0x39, + 0x54, 0x3a, 0xe5, 0xe1, 0x62, 0x93, 0xe3, 0x11, 0xc0, 0xcf, 0x8c, 0x8d, + 0x6e, 0x18, 0x0d, 0xf0, 0x5d, 0x08, 0xc2, 0xfd, 0x2d, 0x93, 0xd5, 0x70, + 0x75, 0x1f}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 259 + {SEC_OID_SHA1, + 259, + {0x30, 0x1c, 0x02, 0x15, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, + 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, + 0x00, 0x00, 0x00, 0x00, 0x00, 0x09, 0x03, 0x80, 0xfe, 0x01}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 260 + {SEC_OID_SHA1, + 260, + {0x30, 0x1a, 0x02, 0x15, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, + 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, + 0x00, 0x00, 0x00, 0x00, 0x00, 0x09, 0x01, 0x42}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 261 + {SEC_OID_SHA1, + 261, + {0x30, 0x81, 0x9b, 0x02, 0x81, 0x81, 0x00, 0xb3, 0x4c, 0xe9, 0xc1, 0xe7, + 0x82, 0x94, 0xd3, 0x25, 0x84, 0x73, 0x84, 0x20, 0x05, 0xd2, 0xa4, 0x8c, + 0x8c, 0x56, 0x6c, 0xfc, 0xa8, 0xf8, 0x4c, 0x06, 0x06, 0xf2, 0x52, 0x9b, + 0x59, 0xa6, 0xd3, 0x8a, 0xae, 0x07, 0x1b, 0x53, 0xbb, 0x21, 0x67, 0xea, + 0xa4, 0xfc, 0x3b, 0x01, 0xfe, 0x17, 0x6e, 0x78, 0x7e, 0x48, 0x1b, 0x60, + 0x37, 0xaa, 0xc6, 0x2c, 0xbc, 0x3d, 0x08, 0x97, 0x99, 0x53, 0x6a, 0x86, + 0x9f, 0xa8, 0xcd, 0xfe, 0xa1, 0xe8, 0xb1, 0xfd, 0x2d, 0x1c, 0xd3, 0xa3, + 0x03, 0x50, 0x85, 0x9a, 0x2c, 0xd6, 0xb3, 0xec, 0x2f, 0x9b, 0xfb, 0xb6, + 0x8b, 0xb1, 0x1b, 0x4b, 0xbe, 0x2a, 0xda, 0xa1, 0x8d, 0x64, 0xa9, 0x36, + 0x39, 0x54, 0x3a, 0xe5, 0xe1, 0x62, 0x93, 0xe3, 0x11, 0xc0, 0xcf, 0x8c, + 0x8d, 0x6e, 0x18, 0x0d, 0xf0, 0x5d, 0x08, 0xc2, 0xfd, 0x2d, 0x93, 0xd5, + 0x70, 0x75, 0x1f, 0x02, 0x15, 0xff, 0x46, 0xf4, 0xc7, 0x45, 0xf5, 0xaf, + 0x5b, 0xc1, 0x39, 0x76, 0x72, 0xc0, 0x64, 0x97, 0xfb, 0x68, 0x88, 0x0b, + 0x76, 0x4f}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 262 + {SEC_OID_SHA1, + 262, + {0x30, 0x81, 0x87, 0x02, 0x81, 0x81, 0x00, 0xb3, 0x4c, 0xe9, 0xc1, 0xe7, + 0x82, 0x94, 0xd3, 0x25, 0x84, 0x73, 0x84, 0x20, 0x05, 0xd2, 0xa4, 0x8c, + 0x8c, 0x56, 0x6c, 0xfc, 0xa8, 0xf8, 0x4c, 0x06, 0x06, 0xf2, 0x52, 0x9b, + 0x59, 0xa6, 0xd3, 0x8a, 0xae, 0x07, 0x1b, 0x53, 0xbb, 0x21, 0x67, 0xea, + 0xa4, 0xfc, 0x3b, 0x01, 0xfe, 0x17, 0x6e, 0x78, 0x7e, 0x48, 0x1b, 0x60, + 0x37, 0xaa, 0xc6, 0x2c, 0xbc, 0x3d, 0x08, 0x97, 0x99, 0x53, 0x6a, 0x86, + 0x9f, 0xa8, 0xcd, 0xfe, 0xa1, 0xe8, 0xb1, 0xfd, 0x2d, 0x1c, 0xd3, 0xa3, + 0x03, 0x50, 0x85, 0x9a, 0x2c, 0xd6, 0xb3, 0xec, 0x2f, 0x9b, 0xfb, 0xb6, + 0x8b, 0xb1, 0x1b, 0x4b, 0xbe, 0x2a, 0xda, 0xa1, 0x8d, 0x64, 0xa9, 0x36, + 0x39, 0x54, 0x3a, 0xe5, 0xe1, 0x62, 0x93, 0xe3, 0x11, 0xc0, 0xcf, 0x8c, + 0x8d, 0x6e, 0x18, 0x0d, 0xf0, 0x5d, 0x08, 0xc2, 0xfd, 0x2d, 0x93, 0xd5, + 0x70, 0x75, 0x1f, 0x02, 0x01, 0x00}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 263 + {SEC_OID_SHA1, + 263, + {0x30, 0x81, 0x87, 0x02, 0x81, 0x81, 0x00, 0xb3, 0x4c, 0xe9, 0xc1, 0xe7, + 0x82, 0x94, 0xd3, 0x25, 0x84, 0x73, 0x84, 0x20, 0x05, 0xd2, 0xa4, 0x8c, + 0x8c, 0x56, 0x6c, 0xfc, 0xa8, 0xf8, 0x4c, 0x06, 0x06, 0xf2, 0x52, 0x9b, + 0x59, 0xa6, 0xd3, 0x8a, 0xae, 0x07, 0x1b, 0x53, 0xbb, 0x21, 0x67, 0xea, + 0xa4, 0xfc, 0x3b, 0x01, 0xfe, 0x17, 0x6e, 0x78, 0x7e, 0x48, 0x1b, 0x60, + 0x37, 0xaa, 0xc6, 0x2c, 0xbc, 0x3d, 0x08, 0x97, 0x99, 0x53, 0x6a, 0x86, + 0x9f, 0xa8, 0xcd, 0xfe, 0xa1, 0xe8, 0xb1, 0xfd, 0x2d, 0x1c, 0xd3, 0xa3, + 0x03, 0x50, 0x85, 0x9a, 0x2c, 0xd6, 0xb3, 0xec, 0x2f, 0x9b, 0xfb, 0xb6, + 0x8b, 0xb1, 0x1b, 0x4b, 0xbe, 0x2a, 0xda, 0xa1, 0x8d, 0x64, 0xa9, 0x36, + 0x39, 0x54, 0x3a, 0xe5, 0xe1, 0x62, 0x93, 0xe3, 0x11, 0xc0, 0xcf, 0x8c, + 0x8d, 0x6e, 0x18, 0x0d, 0xf0, 0x5d, 0x08, 0xc2, 0xfd, 0x2d, 0x93, 0xd5, + 0x70, 0x75, 0x1f, 0x02, 0x01, 0x01}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 264 + {SEC_OID_SHA1, + 264, + {0x30, 0x81, 0x87, 0x02, 0x81, 0x81, 0x00, 0xb3, 0x4c, 0xe9, 0xc1, 0xe7, + 0x82, 0x94, 0xd3, 0x25, 0x84, 0x73, 0x84, 0x20, 0x05, 0xd2, 0xa4, 0x8c, + 0x8c, 0x56, 0x6c, 0xfc, 0xa8, 0xf8, 0x4c, 0x06, 0x06, 0xf2, 0x52, 0x9b, + 0x59, 0xa6, 0xd3, 0x8a, 0xae, 0x07, 0x1b, 0x53, 0xbb, 0x21, 0x67, 0xea, + 0xa4, 0xfc, 0x3b, 0x01, 0xfe, 0x17, 0x6e, 0x78, 0x7e, 0x48, 0x1b, 0x60, + 0x37, 0xaa, 0xc6, 0x2c, 0xbc, 0x3d, 0x08, 0x97, 0x99, 0x53, 0x6a, 0x86, + 0x9f, 0xa8, 0xcd, 0xfe, 0xa1, 0xe8, 0xb1, 0xfd, 0x2d, 0x1c, 0xd3, 0xa3, + 0x03, 0x50, 0x85, 0x9a, 0x2c, 0xd6, 0xb3, 0xec, 0x2f, 0x9b, 0xfb, 0xb6, + 0x8b, 0xb1, 0x1b, 0x4b, 0xbe, 0x2a, 0xda, 0xa1, 0x8d, 0x64, 0xa9, 0x36, + 0x39, 0x54, 0x3a, 0xe5, 0xe1, 0x62, 0x93, 0xe3, 0x11, 0xc0, 0xcf, 0x8c, + 0x8d, 0x6e, 0x18, 0x0d, 0xf0, 0x5d, 0x08, 0xc2, 0xfd, 0x2d, 0x93, 0xd5, + 0x70, 0x75, 0x1f, 0x02, 0x01, 0xff}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 265 + {SEC_OID_SHA1, + 265, + {0x30, 0x81, 0x9a, 0x02, 0x81, 0x81, 0x00, 0xb3, 0x4c, 0xe9, 0xc1, 0xe7, + 0x82, 0x94, 0xd3, 0x25, 0x84, 0x73, 0x84, 0x20, 0x05, 0xd2, 0xa4, 0x8c, + 0x8c, 0x56, 0x6c, 0xfc, 0xa8, 0xf8, 0x4c, 0x06, 0x06, 0xf2, 0x52, 0x9b, + 0x59, 0xa6, 0xd3, 0x8a, 0xae, 0x07, 0x1b, 0x53, 0xbb, 0x21, 0x67, 0xea, + 0xa4, 0xfc, 0x3b, 0x01, 0xfe, 0x17, 0x6e, 0x78, 0x7e, 0x48, 0x1b, 0x60, + 0x37, 0xaa, 0xc6, 0x2c, 0xbc, 0x3d, 0x08, 0x97, 0x99, 0x53, 0x6a, 0x86, + 0x9f, 0xa8, 0xcd, 0xfe, 0xa1, 0xe8, 0xb1, 0xfd, 0x2d, 0x1c, 0xd3, 0xa3, + 0x03, 0x50, 0x85, 0x9a, 0x2c, 0xd6, 0xb3, 0xec, 0x2f, 0x9b, 0xfb, 0xb6, + 0x8b, 0xb1, 0x1b, 0x4b, 0xbe, 0x2a, 0xda, 0xa1, 0x8d, 0x64, 0xa9, 0x36, + 0x39, 0x54, 0x3a, 0xe5, 0xe1, 0x62, 0x93, 0xe3, 0x11, 0xc0, 0xcf, 0x8c, + 0x8d, 0x6e, 0x18, 0x0d, 0xf0, 0x5d, 0x08, 0xc2, 0xfd, 0x2d, 0x93, 0xd5, + 0x70, 0x75, 0x1f, 0x02, 0x14, 0x5c, 0x85, 0x9c, 0x5d, 0x05, 0x28, 0x52, + 0x1f, 0x63, 0x44, 0xc6, 0x9f, 0xcd, 0xb4, 0x02, 0x4b, 0xbb, 0xfa, 0x44, + 0xd8}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 266 + {SEC_OID_SHA1, + 266, + {0x30, 0x81, 0x9a, 0x02, 0x81, 0x81, 0x00, 0xb3, 0x4c, 0xe9, 0xc1, 0xe7, + 0x82, 0x94, 0xd3, 0x25, 0x84, 0x73, 0x84, 0x20, 0x05, 0xd2, 0xa4, 0x8c, + 0x8c, 0x56, 0x6c, 0xfc, 0xa8, 0xf8, 0x4c, 0x06, 0x06, 0xf2, 0x52, 0x9b, + 0x59, 0xa6, 0xd3, 0x8a, 0xae, 0x07, 0x1b, 0x53, 0xbb, 0x21, 0x67, 0xea, + 0xa4, 0xfc, 0x3b, 0x01, 0xfe, 0x17, 0x6e, 0x78, 0x7e, 0x48, 0x1b, 0x60, + 0x37, 0xaa, 0xc6, 0x2c, 0xbc, 0x3d, 0x08, 0x97, 0x99, 0x53, 0x6a, 0x86, + 0x9f, 0xa8, 0xcd, 0xfe, 0xa1, 0xe8, 0xb1, 0xfd, 0x2d, 0x1c, 0xd3, 0xa3, + 0x03, 0x50, 0x85, 0x9a, 0x2c, 0xd6, 0xb3, 0xec, 0x2f, 0x9b, 0xfb, 0xb6, + 0x8b, 0xb1, 0x1b, 0x4b, 0xbe, 0x2a, 0xda, 0xa1, 0x8d, 0x64, 0xa9, 0x36, + 0x39, 0x54, 0x3a, 0xe5, 0xe1, 0x62, 0x93, 0xe3, 0x11, 0xc0, 0xcf, 0x8c, + 0x8d, 0x6e, 0x18, 0x0d, 0xf0, 0x5d, 0x08, 0xc2, 0xfd, 0x2d, 0x93, 0xd5, + 0x70, 0x75, 0x1f, 0x02, 0x14, 0x5c, 0x85, 0x9c, 0x5d, 0x05, 0x28, 0x52, + 0x1f, 0x63, 0x44, 0xc6, 0x9f, 0xcd, 0xb4, 0x02, 0x4b, 0xbb, 0xfa, 0x44, + 0xd9}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 267 + {SEC_OID_SHA1, + 267, + {0x30, 0x81, 0x9b, 0x02, 0x81, 0x81, 0x00, 0xb3, 0x4c, 0xe9, 0xc1, 0xe7, + 0x82, 0x94, 0xd3, 0x25, 0x84, 0x73, 0x84, 0x20, 0x05, 0xd2, 0xa4, 0x8c, + 0x8c, 0x56, 0x6c, 0xfc, 0xa8, 0xf8, 0x4c, 0x06, 0x06, 0xf2, 0x52, 0x9b, + 0x59, 0xa6, 0xd3, 0x8a, 0xae, 0x07, 0x1b, 0x53, 0xbb, 0x21, 0x67, 0xea, + 0xa4, 0xfc, 0x3b, 0x01, 0xfe, 0x17, 0x6e, 0x78, 0x7e, 0x48, 0x1b, 0x60, + 0x37, 0xaa, 0xc6, 0x2c, 0xbc, 0x3d, 0x08, 0x97, 0x99, 0x53, 0x6a, 0x86, + 0x9f, 0xa8, 0xcd, 0xfe, 0xa1, 0xe8, 0xb1, 0xfd, 0x2d, 0x1c, 0xd3, 0xa3, + 0x03, 0x50, 0x85, 0x9a, 0x2c, 0xd6, 0xb3, 0xec, 0x2f, 0x9b, 0xfb, 0xb6, + 0x8b, 0xb1, 0x1b, 0x4b, 0xbe, 0x2a, 0xda, 0xa1, 0x8d, 0x64, 0xa9, 0x36, + 0x39, 0x54, 0x3a, 0xe5, 0xe1, 0x62, 0x93, 0xe3, 0x11, 0xc0, 0xcf, 0x8c, + 0x8d, 0x6e, 0x18, 0x0d, 0xf0, 0x5d, 0x08, 0xc2, 0xfd, 0x2d, 0x93, 0xd5, + 0x70, 0x75, 0x1f, 0x02, 0x15, 0x00, 0xb9, 0x0b, 0x38, 0xba, 0x0a, 0x50, + 0xa4, 0x3e, 0xc6, 0x89, 0x8d, 0x3f, 0x9b, 0x68, 0x04, 0x97, 0x77, 0xf4, + 0x89, 0xb0}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 268 + {SEC_OID_SHA1, + 268, + {0x30, 0x81, 0x9b, 0x02, 0x81, 0x81, 0x00, 0xb3, 0x4c, 0xe9, 0xc1, 0xe7, + 0x82, 0x94, 0xd3, 0x25, 0x84, 0x73, 0x84, 0x20, 0x05, 0xd2, 0xa4, 0x8c, + 0x8c, 0x56, 0x6c, 0xfc, 0xa8, 0xf8, 0x4c, 0x06, 0x06, 0xf2, 0x52, 0x9b, + 0x59, 0xa6, 0xd3, 0x8a, 0xae, 0x07, 0x1b, 0x53, 0xbb, 0x21, 0x67, 0xea, + 0xa4, 0xfc, 0x3b, 0x01, 0xfe, 0x17, 0x6e, 0x78, 0x7e, 0x48, 0x1b, 0x60, + 0x37, 0xaa, 0xc6, 0x2c, 0xbc, 0x3d, 0x08, 0x97, 0x99, 0x53, 0x6a, 0x86, + 0x9f, 0xa8, 0xcd, 0xfe, 0xa1, 0xe8, 0xb1, 0xfd, 0x2d, 0x1c, 0xd3, 0xa3, + 0x03, 0x50, 0x85, 0x9a, 0x2c, 0xd6, 0xb3, 0xec, 0x2f, 0x9b, 0xfb, 0xb6, + 0x8b, 0xb1, 0x1b, 0x4b, 0xbe, 0x2a, 0xda, 0xa1, 0x8d, 0x64, 0xa9, 0x36, + 0x39, 0x54, 0x3a, 0xe5, 0xe1, 0x62, 0x93, 0xe3, 0x11, 0xc0, 0xcf, 0x8c, + 0x8d, 0x6e, 0x18, 0x0d, 0xf0, 0x5d, 0x08, 0xc2, 0xfd, 0x2d, 0x93, 0xd5, + 0x70, 0x75, 0x1f, 0x02, 0x15, 0x00, 0xb9, 0x0b, 0x38, 0xba, 0x0a, 0x50, + 0xa4, 0x3e, 0xc6, 0x89, 0x8d, 0x3f, 0x9b, 0x68, 0x04, 0x97, 0x77, 0xf4, + 0x89, 0xb1}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 269 + {SEC_OID_SHA1, + 269, + {0x30, 0x81, 0x9b, 0x02, 0x81, 0x81, 0x00, 0xb3, 0x4c, 0xe9, 0xc1, 0xe7, + 0x82, 0x94, 0xd3, 0x25, 0x84, 0x73, 0x84, 0x20, 0x05, 0xd2, 0xa4, 0x8c, + 0x8c, 0x56, 0x6c, 0xfc, 0xa8, 0xf8, 0x4c, 0x06, 0x06, 0xf2, 0x52, 0x9b, + 0x59, 0xa6, 0xd3, 0x8a, 0xae, 0x07, 0x1b, 0x53, 0xbb, 0x21, 0x67, 0xea, + 0xa4, 0xfc, 0x3b, 0x01, 0xfe, 0x17, 0x6e, 0x78, 0x7e, 0x48, 0x1b, 0x60, + 0x37, 0xaa, 0xc6, 0x2c, 0xbc, 0x3d, 0x08, 0x97, 0x99, 0x53, 0x6a, 0x86, + 0x9f, 0xa8, 0xcd, 0xfe, 0xa1, 0xe8, 0xb1, 0xfd, 0x2d, 0x1c, 0xd3, 0xa3, + 0x03, 0x50, 0x85, 0x9a, 0x2c, 0xd6, 0xb3, 0xec, 0x2f, 0x9b, 0xfb, 0xb6, + 0x8b, 0xb1, 0x1b, 0x4b, 0xbe, 0x2a, 0xda, 0xa1, 0x8d, 0x64, 0xa9, 0x36, + 0x39, 0x54, 0x3a, 0xe5, 0xe1, 0x62, 0x93, 0xe3, 0x11, 0xc0, 0xcf, 0x8c, + 0x8d, 0x6e, 0x18, 0x0d, 0xf0, 0x5d, 0x08, 0xc2, 0xfd, 0x2d, 0x93, 0xd5, + 0x70, 0x75, 0x1f, 0x02, 0x15, 0x00, 0xb9, 0x0b, 0x38, 0xba, 0x0a, 0x50, + 0xa4, 0x3e, 0xc6, 0x89, 0x8d, 0x3f, 0x9b, 0x68, 0x04, 0x97, 0x77, 0xf4, + 0x89, 0xb2}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 270 + {SEC_OID_SHA1, + 270, + {0x30, 0x81, 0x9b, 0x02, 0x81, 0x81, 0x00, 0xb3, 0x4c, 0xe9, 0xc1, 0xe7, + 0x82, 0x94, 0xd3, 0x25, 0x84, 0x73, 0x84, 0x20, 0x05, 0xd2, 0xa4, 0x8c, + 0x8c, 0x56, 0x6c, 0xfc, 0xa8, 0xf8, 0x4c, 0x06, 0x06, 0xf2, 0x52, 0x9b, + 0x59, 0xa6, 0xd3, 0x8a, 0xae, 0x07, 0x1b, 0x53, 0xbb, 0x21, 0x67, 0xea, + 0xa4, 0xfc, 0x3b, 0x01, 0xfe, 0x17, 0x6e, 0x78, 0x7e, 0x48, 0x1b, 0x60, + 0x37, 0xaa, 0xc6, 0x2c, 0xbc, 0x3d, 0x08, 0x97, 0x99, 0x53, 0x6a, 0x86, + 0x9f, 0xa8, 0xcd, 0xfe, 0xa1, 0xe8, 0xb1, 0xfd, 0x2d, 0x1c, 0xd3, 0xa3, + 0x03, 0x50, 0x85, 0x9a, 0x2c, 0xd6, 0xb3, 0xec, 0x2f, 0x9b, 0xfb, 0xb6, + 0x8b, 0xb1, 0x1b, 0x4b, 0xbe, 0x2a, 0xda, 0xa1, 0x8d, 0x64, 0xa9, 0x36, + 0x39, 0x54, 0x3a, 0xe5, 0xe1, 0x62, 0x93, 0xe3, 0x11, 0xc0, 0xcf, 0x8c, + 0x8d, 0x6e, 0x18, 0x0d, 0xf0, 0x5d, 0x08, 0xc2, 0xfd, 0x2d, 0x93, 0xd5, + 0x70, 0x75, 0x1f, 0x02, 0x15, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, + 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, + 0x00, 0x00}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 271 + {SEC_OID_SHA1, + 271, + {0x30, 0x82, 0x01, 0x08, 0x02, 0x81, 0x81, 0x00, 0xb3, 0x4c, 0xe9, 0xc1, + 0xe7, 0x82, 0x94, 0xd3, 0x25, 0x84, 0x73, 0x84, 0x20, 0x05, 0xd2, 0xa4, + 0x8c, 0x8c, 0x56, 0x6c, 0xfc, 0xa8, 0xf8, 0x4c, 0x06, 0x06, 0xf2, 0x52, + 0x9b, 0x59, 0xa6, 0xd3, 0x8a, 0xae, 0x07, 0x1b, 0x53, 0xbb, 0x21, 0x67, + 0xea, 0xa4, 0xfc, 0x3b, 0x01, 0xfe, 0x17, 0x6e, 0x78, 0x7e, 0x48, 0x1b, + 0x60, 0x37, 0xaa, 0xc6, 0x2c, 0xbc, 0x3d, 0x08, 0x97, 0x99, 0x53, 0x6a, + 0x86, 0x9f, 0xa8, 0xcd, 0xfe, 0xa1, 0xe8, 0xb1, 0xfd, 0x2d, 0x1c, 0xd3, + 0xa3, 0x03, 0x50, 0x85, 0x9a, 0x2c, 0xd6, 0xb3, 0xec, 0x2f, 0x9b, 0xfb, + 0xb6, 0x8b, 0xb1, 0x1b, 0x4b, 0xbe, 0x2a, 0xda, 0xa1, 0x8d, 0x64, 0xa9, + 0x36, 0x39, 0x54, 0x3a, 0xe5, 0xe1, 0x62, 0x93, 0xe3, 0x11, 0xc0, 0xcf, + 0x8c, 0x8d, 0x6e, 0x18, 0x0d, 0xf0, 0x5d, 0x08, 0xc2, 0xfd, 0x2d, 0x93, + 0xd5, 0x70, 0x75, 0x1f, 0x02, 0x81, 0x81, 0x00, 0xb3, 0x4c, 0xe9, 0xc1, + 0xe7, 0x82, 0x94, 0xd3, 0x25, 0x84, 0x73, 0x84, 0x20, 0x05, 0xd2, 0xa4, + 0x8c, 0x8c, 0x56, 0x6c, 0xfc, 0xa8, 0xf8, 0x4c, 0x06, 0x06, 0xf2, 0x52, + 0x9b, 0x59, 0xa6, 0xd3, 0x8a, 0xae, 0x07, 0x1b, 0x53, 0xbb, 0x21, 0x67, + 0xea, 0xa4, 0xfc, 0x3b, 0x01, 0xfe, 0x17, 0x6e, 0x78, 0x7e, 0x48, 0x1b, + 0x60, 0x37, 0xaa, 0xc6, 0x2c, 0xbc, 0x3d, 0x08, 0x97, 0x99, 0x53, 0x6a, + 0x86, 0x9f, 0xa8, 0xcd, 0xfe, 0xa1, 0xe8, 0xb1, 0xfd, 0x2d, 0x1c, 0xd3, + 0xa3, 0x03, 0x50, 0x85, 0x9a, 0x2c, 0xd6, 0xb3, 0xec, 0x2f, 0x9b, 0xfb, + 0xb6, 0x8b, 0xb1, 0x1b, 0x4b, 0xbe, 0x2a, 0xda, 0xa1, 0x8d, 0x64, 0xa9, + 0x36, 0x39, 0x54, 0x3a, 0xe5, 0xe1, 0x62, 0x93, 0xe3, 0x11, 0xc0, 0xcf, + 0x8c, 0x8d, 0x6e, 0x18, 0x0d, 0xf0, 0x5d, 0x08, 0xc2, 0xfd, 0x2d, 0x93, + 0xd5, 0x70, 0x75, 0x1f}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 272 + {SEC_OID_SHA1, + 272, + {0x30, 0x81, 0x89, 0x02, 0x81, 0x81, 0x00, 0xb3, 0x4c, 0xe9, 0xc1, 0xe7, + 0x82, 0x94, 0xd3, 0x25, 0x84, 0x73, 0x84, 0x20, 0x05, 0xd2, 0xa4, 0x8c, + 0x8c, 0x56, 0x6c, 0xfc, 0xa8, 0xf8, 0x4c, 0x06, 0x06, 0xf2, 0x52, 0x9b, + 0x59, 0xa6, 0xd3, 0x8a, 0xae, 0x07, 0x1b, 0x53, 0xbb, 0x21, 0x67, 0xea, + 0xa4, 0xfc, 0x3b, 0x01, 0xfe, 0x17, 0x6e, 0x78, 0x7e, 0x48, 0x1b, 0x60, + 0x37, 0xaa, 0xc6, 0x2c, 0xbc, 0x3d, 0x08, 0x97, 0x99, 0x53, 0x6a, 0x86, + 0x9f, 0xa8, 0xcd, 0xfe, 0xa1, 0xe8, 0xb1, 0xfd, 0x2d, 0x1c, 0xd3, 0xa3, + 0x03, 0x50, 0x85, 0x9a, 0x2c, 0xd6, 0xb3, 0xec, 0x2f, 0x9b, 0xfb, 0xb6, + 0x8b, 0xb1, 0x1b, 0x4b, 0xbe, 0x2a, 0xda, 0xa1, 0x8d, 0x64, 0xa9, 0x36, + 0x39, 0x54, 0x3a, 0xe5, 0xe1, 0x62, 0x93, 0xe3, 0x11, 0xc0, 0xcf, 0x8c, + 0x8d, 0x6e, 0x18, 0x0d, 0xf0, 0x5d, 0x08, 0xc2, 0xfd, 0x2d, 0x93, 0xd5, + 0x70, 0x75, 0x1f, 0x09, 0x03, 0x80, 0xfe, 0x01}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 273 + {SEC_OID_SHA1, + 273, + {0x30, 0x81, 0x87, 0x02, 0x81, 0x81, 0x00, 0xb3, 0x4c, 0xe9, 0xc1, 0xe7, + 0x82, 0x94, 0xd3, 0x25, 0x84, 0x73, 0x84, 0x20, 0x05, 0xd2, 0xa4, 0x8c, + 0x8c, 0x56, 0x6c, 0xfc, 0xa8, 0xf8, 0x4c, 0x06, 0x06, 0xf2, 0x52, 0x9b, + 0x59, 0xa6, 0xd3, 0x8a, 0xae, 0x07, 0x1b, 0x53, 0xbb, 0x21, 0x67, 0xea, + 0xa4, 0xfc, 0x3b, 0x01, 0xfe, 0x17, 0x6e, 0x78, 0x7e, 0x48, 0x1b, 0x60, + 0x37, 0xaa, 0xc6, 0x2c, 0xbc, 0x3d, 0x08, 0x97, 0x99, 0x53, 0x6a, 0x86, + 0x9f, 0xa8, 0xcd, 0xfe, 0xa1, 0xe8, 0xb1, 0xfd, 0x2d, 0x1c, 0xd3, 0xa3, + 0x03, 0x50, 0x85, 0x9a, 0x2c, 0xd6, 0xb3, 0xec, 0x2f, 0x9b, 0xfb, 0xb6, + 0x8b, 0xb1, 0x1b, 0x4b, 0xbe, 0x2a, 0xda, 0xa1, 0x8d, 0x64, 0xa9, 0x36, + 0x39, 0x54, 0x3a, 0xe5, 0xe1, 0x62, 0x93, 0xe3, 0x11, 0xc0, 0xcf, 0x8c, + 0x8d, 0x6e, 0x18, 0x0d, 0xf0, 0x5d, 0x08, 0xc2, 0xfd, 0x2d, 0x93, 0xd5, + 0x70, 0x75, 0x1f, 0x09, 0x01, 0x42}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 274 + {SEC_OID_SHA1, + 274, + {0x30, 0x1c, 0x09, 0x03, 0x80, 0xfe, 0x01, 0x02, 0x15, 0xff, + 0x46, 0xf4, 0xc7, 0x45, 0xf5, 0xaf, 0x5b, 0xc1, 0x39, 0x76, + 0x72, 0xc0, 0x64, 0x97, 0xfb, 0x68, 0x88, 0x0b, 0x76, 0x4f}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 275 + {SEC_OID_SHA1, + 275, + {0x30, 0x08, 0x09, 0x03, 0x80, 0xfe, 0x01, 0x02, 0x01, 0x00}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 276 + {SEC_OID_SHA1, + 276, + {0x30, 0x08, 0x09, 0x03, 0x80, 0xfe, 0x01, 0x02, 0x01, 0x01}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 277 + {SEC_OID_SHA1, + 277, + {0x30, 0x08, 0x09, 0x03, 0x80, 0xfe, 0x01, 0x02, 0x01, 0xff}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 278 + {SEC_OID_SHA1, + 278, + {0x30, 0x1b, 0x09, 0x03, 0x80, 0xfe, 0x01, 0x02, 0x14, 0x5c, + 0x85, 0x9c, 0x5d, 0x05, 0x28, 0x52, 0x1f, 0x63, 0x44, 0xc6, + 0x9f, 0xcd, 0xb4, 0x02, 0x4b, 0xbb, 0xfa, 0x44, 0xd8}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 279 + {SEC_OID_SHA1, + 279, + {0x30, 0x1b, 0x09, 0x03, 0x80, 0xfe, 0x01, 0x02, 0x14, 0x5c, + 0x85, 0x9c, 0x5d, 0x05, 0x28, 0x52, 0x1f, 0x63, 0x44, 0xc6, + 0x9f, 0xcd, 0xb4, 0x02, 0x4b, 0xbb, 0xfa, 0x44, 0xd9}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 280 + {SEC_OID_SHA1, + 280, + {0x30, 0x1c, 0x09, 0x03, 0x80, 0xfe, 0x01, 0x02, 0x15, 0x00, + 0xb9, 0x0b, 0x38, 0xba, 0x0a, 0x50, 0xa4, 0x3e, 0xc6, 0x89, + 0x8d, 0x3f, 0x9b, 0x68, 0x04, 0x97, 0x77, 0xf4, 0x89, 0xb0}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 281 + {SEC_OID_SHA1, + 281, + {0x30, 0x1c, 0x09, 0x03, 0x80, 0xfe, 0x01, 0x02, 0x15, 0x00, + 0xb9, 0x0b, 0x38, 0xba, 0x0a, 0x50, 0xa4, 0x3e, 0xc6, 0x89, + 0x8d, 0x3f, 0x9b, 0x68, 0x04, 0x97, 0x77, 0xf4, 0x89, 0xb1}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 282 + {SEC_OID_SHA1, + 282, + {0x30, 0x1c, 0x09, 0x03, 0x80, 0xfe, 0x01, 0x02, 0x15, 0x00, + 0xb9, 0x0b, 0x38, 0xba, 0x0a, 0x50, 0xa4, 0x3e, 0xc6, 0x89, + 0x8d, 0x3f, 0x9b, 0x68, 0x04, 0x97, 0x77, 0xf4, 0x89, 0xb2}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 283 + {SEC_OID_SHA1, + 283, + {0x30, 0x1c, 0x09, 0x03, 0x80, 0xfe, 0x01, 0x02, 0x15, 0x01, + 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, + 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 284 + {SEC_OID_SHA1, + 284, + {0x30, 0x81, 0x89, 0x09, 0x03, 0x80, 0xfe, 0x01, 0x02, 0x81, 0x81, 0x00, + 0xb3, 0x4c, 0xe9, 0xc1, 0xe7, 0x82, 0x94, 0xd3, 0x25, 0x84, 0x73, 0x84, + 0x20, 0x05, 0xd2, 0xa4, 0x8c, 0x8c, 0x56, 0x6c, 0xfc, 0xa8, 0xf8, 0x4c, + 0x06, 0x06, 0xf2, 0x52, 0x9b, 0x59, 0xa6, 0xd3, 0x8a, 0xae, 0x07, 0x1b, + 0x53, 0xbb, 0x21, 0x67, 0xea, 0xa4, 0xfc, 0x3b, 0x01, 0xfe, 0x17, 0x6e, + 0x78, 0x7e, 0x48, 0x1b, 0x60, 0x37, 0xaa, 0xc6, 0x2c, 0xbc, 0x3d, 0x08, + 0x97, 0x99, 0x53, 0x6a, 0x86, 0x9f, 0xa8, 0xcd, 0xfe, 0xa1, 0xe8, 0xb1, + 0xfd, 0x2d, 0x1c, 0xd3, 0xa3, 0x03, 0x50, 0x85, 0x9a, 0x2c, 0xd6, 0xb3, + 0xec, 0x2f, 0x9b, 0xfb, 0xb6, 0x8b, 0xb1, 0x1b, 0x4b, 0xbe, 0x2a, 0xda, + 0xa1, 0x8d, 0x64, 0xa9, 0x36, 0x39, 0x54, 0x3a, 0xe5, 0xe1, 0x62, 0x93, + 0xe3, 0x11, 0xc0, 0xcf, 0x8c, 0x8d, 0x6e, 0x18, 0x0d, 0xf0, 0x5d, 0x08, + 0xc2, 0xfd, 0x2d, 0x93, 0xd5, 0x70, 0x75, 0x1f}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 285 + {SEC_OID_SHA1, + 285, + {0x30, 0x0a, 0x09, 0x03, 0x80, 0xfe, 0x01, 0x09, 0x03, 0x80, 0xfe, 0x01}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 286 + {SEC_OID_SHA1, + 286, + {0x30, 0x08, 0x09, 0x03, 0x80, 0xfe, 0x01, 0x09, 0x01, 0x42}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: Signature encoding contains wrong type. + // tcID: 287 + {SEC_OID_SHA1, + 287, + {0x30, 0x06, 0x02, 0x01, 0x01, 0x0c, 0x01, 0x30}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: Signature encoding contains wrong type. + // tcID: 288 + {SEC_OID_SHA1, + 288, + {0x30, 0x05, 0x02, 0x01, 0x01, 0x0c, 0x00}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: Signature encoding contains wrong type. + // tcID: 289 + {SEC_OID_SHA1, + 289, + {0x30, 0x09, 0x0c, 0x02, 0x25, 0x73, 0x0c, 0x03, 0x73, 0x25, 0x73}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: Signature encoding contains wrong type. + // tcID: 290 + {SEC_OID_SHA1, + 290, + {0x30, 0x08, 0x02, 0x01, 0x01, 0x30, 0x03, 0x02, 0x01, 0x00}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: Signature encoding contains wrong type. + // tcID: 291 + {SEC_OID_SHA1, + 291, + {0x30, 0x03, 0x02, 0x01, 0x01}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: Signature encoding contains wrong type. + // tcID: 292 + {SEC_OID_SHA1, + 292, + {0x30, 0x06, 0x02, 0x01, 0x01, 0x01, 0x01, 0x00}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + false}, + + // Comment: random signature + // tcID: 293 + {SEC_OID_SHA1, + 293, + {0x30, 0x2e, 0x02, 0x15, 0x00, 0x88, 0x54, 0xbd, 0xb5, 0x2d, 0x20, 0xff, + 0x9e, 0xa4, 0x99, 0x48, 0x3f, 0xba, 0x4d, 0x3c, 0x10, 0x1a, 0x58, 0x6f, + 0xc7, 0x02, 0x15, 0x00, 0xb2, 0x30, 0x45, 0x90, 0x09, 0x95, 0xd3, 0xfe, + 0x3c, 0x4c, 0x63, 0x8a, 0x3e, 0x06, 0x45, 0x8a, 0x25, 0xa1, 0xe9, 0xdd}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + true}, + + // Comment: random signature + // tcID: 294 + {SEC_OID_SHA1, + 294, + {0x30, 0x2c, 0x02, 0x14, 0x4f, 0x6b, 0xf1, 0x89, 0x41, 0xab, 0xbf, 0x33, + 0x21, 0x1d, 0x95, 0x61, 0xa1, 0x4f, 0x9a, 0xeb, 0xd0, 0x3f, 0x4e, 0x94, + 0x02, 0x14, 0x21, 0x8c, 0xda, 0x35, 0x0d, 0xef, 0x7f, 0x75, 0x61, 0x7f, + 0xcc, 0x79, 0x9d, 0x0c, 0xf2, 0xcf, 0x6b, 0x23, 0x43, 0x8d}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + true}, + + // Comment: random signature + // tcID: 295 + {SEC_OID_SHA1, + 295, + {0x30, 0x2c, 0x02, 0x14, 0x45, 0x9e, 0xaf, 0x08, 0x86, 0x16, 0x00, 0x81, + 0xb4, 0x7f, 0xc5, 0x73, 0xfb, 0x3d, 0x15, 0x2d, 0x68, 0x0d, 0x3b, 0x4b, + 0x02, 0x14, 0x42, 0x93, 0xdb, 0xb9, 0x4d, 0xb4, 0xc9, 0x30, 0xd6, 0x7e, + 0x27, 0xfc, 0x4e, 0xc8, 0x53, 0x8b, 0x58, 0xd1, 0xc7, 0xcd}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + true}, + + // Comment: random signature + // tcID: 296 + {SEC_OID_SHA1, + 296, + {0x30, 0x2c, 0x02, 0x14, 0x0a, 0x6c, 0x12, 0xb8, 0xff, 0x5c, 0xa2, 0x1c, + 0x4e, 0xa0, 0xc7, 0xac, 0xea, 0x38, 0xd7, 0x6f, 0xd1, 0x70, 0xb9, 0x7f, + 0x02, 0x14, 0x29, 0xce, 0x2c, 0xf2, 0x67, 0x2f, 0xa6, 0x40, 0x03, 0x16, + 0x80, 0xdc, 0xe2, 0x22, 0x39, 0x32, 0xf6, 0x13, 0xf6, 0xa5}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + true}, + + // Comment: random signature + // tcID: 297 + {SEC_OID_SHA1, + 297, + {0x30, 0x2c, 0x02, 0x14, 0x34, 0xbc, 0xe4, 0x77, 0x3e, 0x5e, 0x11, 0x87, + 0x5e, 0xa2, 0x20, 0x2b, 0xc3, 0x3e, 0x01, 0xfe, 0x00, 0xb3, 0x32, 0x1a, + 0x02, 0x14, 0x2b, 0x29, 0x4e, 0x01, 0xa9, 0x72, 0x96, 0xd8, 0x4e, 0x4c, + 0x60, 0xbf, 0xba, 0x05, 0xd2, 0x76, 0x09, 0x81, 0xc9, 0x20}, + kPubKey0, + {0x31, 0x32, 0x33, 0x34, 0x30, 0x30}, + true}, + + // Comment: r,s = 1,1 + // tcID: 298 + {SEC_OID_SHA1, + 298, + {0x30, 0x06, 0x02, 0x01, 0x01, 0x02, 0x01, 0x01}, + kPubKey1, + {0x54, 0x65, 0x73, 0x74}, + true}, + + // Comment: r,s = 1,5 + // tcID: 299 + {SEC_OID_SHA1, + 299, + {0x30, 0x06, 0x02, 0x01, 0x01, 0x02, 0x01, 0x05}, + kPubKey1, + {0x54, 0x65, 0x73, 0x74}, + true}, + + // Comment: u2 small + // tcID: 300 + {SEC_OID_SHA1, + 300, + {0x30, 0x19, 0x02, 0x01, 0x01, 0x02, 0x14, 0x25, 0x02, + 0x3e, 0x8b, 0x9b, 0xa9, 0xba, 0x72, 0xf4, 0x81, 0xe9, + 0x0c, 0xb8, 0xae, 0x67, 0x51, 0x7e, 0x64, 0x1b, 0x8a}, + kPubKey1, + {0x54, 0x65, 0x73, 0x74}, + true}, + + // Comment: s == q-1 + // tcID: 301 + {SEC_OID_SHA1, + 301, + {0x30, 0x1a, 0x02, 0x01, 0x01, 0x02, 0x15, 0x00, 0xb9, 0x0b, + 0x38, 0xba, 0x0a, 0x50, 0xa4, 0x3e, 0xc6, 0x89, 0x8d, 0x3f, + 0x9b, 0x68, 0x04, 0x97, 0x77, 0xf4, 0x89, 0xb0}, + kPubKey1, + {0x54, 0x65, 0x73, 0x74}, + true}, + + // Comment: s == 1 + // tcID: 302 + {SEC_OID_SHA1, + 302, + {0x30, 0x19, 0x02, 0x14, 0x62, 0xba, 0x82, 0x73, 0x81, + 0x39, 0x6d, 0xc4, 0x4f, 0xac, 0xc6, 0x6c, 0x34, 0x4f, + 0x91, 0x78, 0x8f, 0x11, 0xc6, 0xfc, 0x02, 0x01, 0x01}, + kPubKey2, + {0x54, 0x65, 0x73, 0x74}, + true}, + + // Comment: Legacy:ASN encoding of s misses leading 0 + // tcID: 303 + {SEC_OID_SHA224, + 303, + {0x30, 0x3c, 0x02, 0x1c, 0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57, 0x69, + 0x05, 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, 0xcc, 0xf3, + 0x48, 0x43, 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd, 0x02, + 0x1c, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, 0x0f, 0x9e, 0xf4, + 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69, 0x67, 0xcf, 0x33, + 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + true}, + + // Comment: valid + // tcID: 304 + {SEC_OID_SHA224, + 304, + {0x30, 0x3d, 0x02, 0x1c, 0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57, 0x69, + 0x05, 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, 0xcc, 0xf3, + 0x48, 0x43, 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd, 0x02, + 0x1d, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, 0x0f, 0x9e, + 0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69, 0x67, 0xcf, + 0x33, 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + true}, + + // Comment: long form encoding of length of sequence + // tcID: 305 + {SEC_OID_SHA224, + 305, + {0x30, 0x81, 0x3d, 0x02, 0x1c, 0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57, + 0x69, 0x05, 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, 0xcc, + 0xf3, 0x48, 0x43, 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd, + 0x02, 0x1d, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, 0x0f, + 0x9e, 0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69, 0x67, + 0xcf, 0x33, 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: length of sequence contains leading 0 + // tcID: 306 + {SEC_OID_SHA224, + 306, + {0x30, 0x82, 0x00, 0x3d, 0x02, 0x1c, 0x1e, 0x41, 0xb4, 0x79, 0xad, + 0x57, 0x69, 0x05, 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, + 0xcc, 0xf3, 0x48, 0x43, 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, + 0xcd, 0x02, 0x1d, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, + 0x0f, 0x9e, 0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69, + 0x67, 0xcf, 0x33, 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: wrong length of sequence + // tcID: 307 + {SEC_OID_SHA224, + 307, + {0x30, 0x3e, 0x02, 0x1c, 0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57, 0x69, + 0x05, 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, 0xcc, 0xf3, + 0x48, 0x43, 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd, 0x02, + 0x1d, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, 0x0f, 0x9e, + 0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69, 0x67, 0xcf, + 0x33, 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: wrong length of sequence + // tcID: 308 + {SEC_OID_SHA224, + 308, + {0x30, 0x3c, 0x02, 0x1c, 0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57, 0x69, + 0x05, 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, 0xcc, 0xf3, + 0x48, 0x43, 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd, 0x02, + 0x1d, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, 0x0f, 0x9e, + 0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69, 0x67, 0xcf, + 0x33, 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: uint32 overflow in length of sequence + // tcID: 309 + {SEC_OID_SHA224, + 309, + {0x30, 0x85, 0x01, 0x00, 0x00, 0x00, 0x3d, 0x02, 0x1c, 0x1e, 0x41, 0xb4, + 0x79, 0xad, 0x57, 0x69, 0x05, 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, + 0xb0, 0xcc, 0xf3, 0x48, 0x43, 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, + 0xcd, 0x02, 0x1d, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, 0x0f, + 0x9e, 0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69, 0x67, 0xcf, + 0x33, 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: uint64 overflow in length of sequence + // tcID: 310 + {SEC_OID_SHA224, + 310, + {0x30, 0x89, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x3d, 0x02, + 0x1c, 0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57, 0x69, 0x05, 0xb9, 0x60, 0xfe, + 0x14, 0xea, 0xdb, 0x91, 0xb0, 0xcc, 0xf3, 0x48, 0x43, 0xda, 0xb9, 0x16, + 0x17, 0x3b, 0xb8, 0xc9, 0xcd, 0x02, 0x1d, 0x00, 0xad, 0xe6, 0x59, 0x88, + 0xd2, 0x37, 0xd3, 0x0f, 0x9e, 0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, + 0xf1, 0x69, 0x67, 0xcf, 0x33, 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: length of sequence = 2**31 - 1 + // tcID: 311 + {SEC_OID_SHA224, + 311, + {0x30, 0x84, 0x7f, 0xff, 0xff, 0xff, 0x02, 0x1c, 0x1e, 0x41, 0xb4, 0x79, + 0xad, 0x57, 0x69, 0x05, 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, + 0xcc, 0xf3, 0x48, 0x43, 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd, + 0x02, 0x1d, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, 0x0f, 0x9e, + 0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69, 0x67, 0xcf, 0x33, + 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: length of sequence = 2**32 - 1 + // tcID: 312 + {SEC_OID_SHA224, + 312, + {0x30, 0x84, 0xff, 0xff, 0xff, 0xff, 0x02, 0x1c, 0x1e, 0x41, 0xb4, 0x79, + 0xad, 0x57, 0x69, 0x05, 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, + 0xcc, 0xf3, 0x48, 0x43, 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd, + 0x02, 0x1d, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, 0x0f, 0x9e, + 0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69, 0x67, 0xcf, 0x33, + 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: length of sequence = 2**40 - 1 + // tcID: 313 + {SEC_OID_SHA224, + 313, + {0x30, 0x85, 0xff, 0xff, 0xff, 0xff, 0xff, 0x02, 0x1c, 0x1e, 0x41, 0xb4, + 0x79, 0xad, 0x57, 0x69, 0x05, 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, + 0xb0, 0xcc, 0xf3, 0x48, 0x43, 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, + 0xcd, 0x02, 0x1d, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, 0x0f, + 0x9e, 0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69, 0x67, 0xcf, + 0x33, 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: length of sequence = 2**64 - 1 + // tcID: 314 + {SEC_OID_SHA224, + 314, + {0x30, 0x88, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x02, 0x1c, + 0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57, 0x69, 0x05, 0xb9, 0x60, 0xfe, 0x14, + 0xea, 0xdb, 0x91, 0xb0, 0xcc, 0xf3, 0x48, 0x43, 0xda, 0xb9, 0x16, 0x17, + 0x3b, 0xb8, 0xc9, 0xcd, 0x02, 0x1d, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, + 0x37, 0xd3, 0x0f, 0x9e, 0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, + 0x69, 0x67, 0xcf, 0x33, 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: incorrect length of sequence + // tcID: 315 + {SEC_OID_SHA224, + 315, + {0x30, 0xff, 0x02, 0x1c, 0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57, 0x69, + 0x05, 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, 0xcc, 0xf3, + 0x48, 0x43, 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd, 0x02, + 0x1d, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, 0x0f, 0x9e, + 0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69, 0x67, 0xcf, + 0x33, 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: indefinite length without termination + // tcID: 316 + {SEC_OID_SHA224, + 316, + {0x30, 0x80, 0x02, 0x1c, 0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57, 0x69, + 0x05, 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, 0xcc, 0xf3, + 0x48, 0x43, 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd, 0x02, + 0x1d, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, 0x0f, 0x9e, + 0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69, 0x67, 0xcf, + 0x33, 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: indefinite length without termination + // tcID: 317 + {SEC_OID_SHA224, + 317, + {0x30, 0x3d, 0x02, 0x80, 0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57, 0x69, + 0x05, 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, 0xcc, 0xf3, + 0x48, 0x43, 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd, 0x02, + 0x1d, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, 0x0f, 0x9e, + 0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69, 0x67, 0xcf, + 0x33, 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: indefinite length without termination + // tcID: 318 + {SEC_OID_SHA224, + 318, + {0x30, 0x3d, 0x02, 0x1c, 0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57, 0x69, + 0x05, 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, 0xcc, 0xf3, + 0x48, 0x43, 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd, 0x02, + 0x80, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, 0x0f, 0x9e, + 0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69, 0x67, 0xcf, + 0x33, 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: removing sequence + // tcID: 319 + {SEC_OID_SHA224, 319, {}, kPubKey3, {0x48, 0x65, 0x6c, 0x6c, 0x6f}, false}, + + // Comment: lonely sequence tag + // tcID: 320 + {SEC_OID_SHA224, + 320, + {0x30}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: appending 0's to sequence + // tcID: 321 + {SEC_OID_SHA224, + 321, + {0x30, 0x3f, 0x02, 0x1c, 0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57, 0x69, + 0x05, 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, 0xcc, 0xf3, + 0x48, 0x43, 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd, 0x02, + 0x1d, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, 0x0f, 0x9e, + 0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69, 0x67, 0xcf, + 0x33, 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36, 0x00, 0x00}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: prepending 0's to sequence + // tcID: 322 + {SEC_OID_SHA224, + 322, + {0x30, 0x3f, 0x00, 0x00, 0x02, 0x1c, 0x1e, 0x41, 0xb4, 0x79, 0xad, + 0x57, 0x69, 0x05, 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, + 0xcc, 0xf3, 0x48, 0x43, 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, + 0xcd, 0x02, 0x1d, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, + 0x0f, 0x9e, 0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69, + 0x67, 0xcf, 0x33, 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: appending unused 0's to sequence + // tcID: 323 + {SEC_OID_SHA224, + 323, + {0x30, 0x3d, 0x02, 0x1c, 0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57, 0x69, + 0x05, 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, 0xcc, 0xf3, + 0x48, 0x43, 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd, 0x02, + 0x1d, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, 0x0f, 0x9e, + 0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69, 0x67, 0xcf, + 0x33, 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36, 0x00, 0x00}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: appending null value to sequence + // tcID: 324 + {SEC_OID_SHA224, + 324, + {0x30, 0x3f, 0x02, 0x1c, 0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57, 0x69, + 0x05, 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, 0xcc, 0xf3, + 0x48, 0x43, 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd, 0x02, + 0x1d, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, 0x0f, 0x9e, + 0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69, 0x67, 0xcf, + 0x33, 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36, 0x05, 0x00}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: including garbage + // tcID: 325 + {SEC_OID_SHA224, + 325, + {0x30, 0x42, 0x49, 0x81, 0x77, 0x30, 0x3d, 0x02, 0x1c, 0x1e, 0x41, 0xb4, + 0x79, 0xad, 0x57, 0x69, 0x05, 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, + 0xb0, 0xcc, 0xf3, 0x48, 0x43, 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, + 0xcd, 0x02, 0x1d, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, 0x0f, + 0x9e, 0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69, 0x67, 0xcf, + 0x33, 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: including garbage + // tcID: 326 + {SEC_OID_SHA224, + 326, + {0x30, 0x41, 0x25, 0x00, 0x30, 0x3d, 0x02, 0x1c, 0x1e, 0x41, 0xb4, 0x79, + 0xad, 0x57, 0x69, 0x05, 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, + 0xcc, 0xf3, 0x48, 0x43, 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd, + 0x02, 0x1d, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, 0x0f, 0x9e, + 0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69, 0x67, 0xcf, 0x33, + 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: including garbage + // tcID: 327 + {SEC_OID_SHA224, + 327, + {0x30, 0x3f, 0x30, 0x3d, 0x02, 0x1c, 0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57, + 0x69, 0x05, 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, 0xcc, 0xf3, + 0x48, 0x43, 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd, 0x02, 0x1d, + 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, 0x0f, 0x9e, 0xf4, 0x1d, + 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69, 0x67, 0xcf, 0x33, 0x65, 0x81, + 0x3f, 0xe8, 0x78, 0x62, 0x36, 0x00, 0x04, 0xde, 0xad, 0xbe, 0xef}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: including garbage + // tcID: 328 + {SEC_OID_SHA224, + 328, + {0x30, 0x42, 0x22, 0x21, 0x49, 0x81, 0x77, 0x02, 0x1c, 0x1e, 0x41, 0xb4, + 0x79, 0xad, 0x57, 0x69, 0x05, 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, + 0xb0, 0xcc, 0xf3, 0x48, 0x43, 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, + 0xcd, 0x02, 0x1d, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, 0x0f, + 0x9e, 0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69, 0x67, 0xcf, + 0x33, 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: including garbage + // tcID: 329 + {SEC_OID_SHA224, + 329, + {0x30, 0x41, 0x22, 0x20, 0x25, 0x00, 0x02, 0x1c, 0x1e, 0x41, 0xb4, 0x79, + 0xad, 0x57, 0x69, 0x05, 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, + 0xcc, 0xf3, 0x48, 0x43, 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd, + 0x02, 0x1d, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, 0x0f, 0x9e, + 0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69, 0x67, 0xcf, 0x33, + 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: including garbage + // tcID: 330 + {SEC_OID_SHA224, + 330, + {0x30, 0x45, 0x22, 0x1e, 0x02, 0x1c, 0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57, + 0x69, 0x05, 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, 0xcc, 0xf3, + 0x48, 0x43, 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd, 0x00, 0x04, + 0xde, 0xad, 0xbe, 0xef, 0x02, 0x1d, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, + 0x37, 0xd3, 0x0f, 0x9e, 0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, + 0x69, 0x67, 0xcf, 0x33, 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: including garbage + // tcID: 331 + {SEC_OID_SHA224, + 331, + {0x30, 0x42, 0x02, 0x1c, 0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57, 0x69, 0x05, + 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, 0xcc, 0xf3, 0x48, 0x43, + 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd, 0x22, 0x22, 0x49, 0x81, + 0x77, 0x02, 0x1d, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, 0x0f, + 0x9e, 0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69, 0x67, 0xcf, + 0x33, 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: including garbage + // tcID: 332 + {SEC_OID_SHA224, + 332, + {0x30, 0x41, 0x02, 0x1c, 0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57, 0x69, 0x05, + 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, 0xcc, 0xf3, 0x48, 0x43, + 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd, 0x22, 0x21, 0x25, 0x00, + 0x02, 0x1d, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, 0x0f, 0x9e, + 0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69, 0x67, 0xcf, 0x33, + 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: including garbage + // tcID: 333 + {SEC_OID_SHA224, + 333, + {0x30, 0x45, 0x02, 0x1c, 0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57, 0x69, 0x05, + 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, 0xcc, 0xf3, 0x48, 0x43, + 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd, 0x22, 0x1f, 0x02, 0x1d, + 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, 0x0f, 0x9e, 0xf4, 0x1d, + 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69, 0x67, 0xcf, 0x33, 0x65, 0x81, + 0x3f, 0xe8, 0x78, 0x62, 0x36, 0x00, 0x04, 0xde, 0xad, 0xbe, 0xef}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: including undefined tags + // tcID: 334 + {SEC_OID_SHA224, + 334, + {0x30, 0x45, 0xaa, 0x00, 0xbb, 0x00, 0xcd, 0x00, 0x30, 0x3d, 0x02, 0x1c, + 0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57, 0x69, 0x05, 0xb9, 0x60, 0xfe, 0x14, + 0xea, 0xdb, 0x91, 0xb0, 0xcc, 0xf3, 0x48, 0x43, 0xda, 0xb9, 0x16, 0x17, + 0x3b, 0xb8, 0xc9, 0xcd, 0x02, 0x1d, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, + 0x37, 0xd3, 0x0f, 0x9e, 0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, + 0x69, 0x67, 0xcf, 0x33, 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: including undefined tags + // tcID: 335 + {SEC_OID_SHA224, + 335, + {0x30, 0x43, 0xaa, 0x02, 0xaa, 0xbb, 0x30, 0x3d, 0x02, 0x1c, 0x1e, 0x41, + 0xb4, 0x79, 0xad, 0x57, 0x69, 0x05, 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, + 0x91, 0xb0, 0xcc, 0xf3, 0x48, 0x43, 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, + 0xc9, 0xcd, 0x02, 0x1d, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, + 0x0f, 0x9e, 0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69, 0x67, + 0xcf, 0x33, 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: including undefined tags + // tcID: 336 + {SEC_OID_SHA224, + 336, + {0x30, 0x45, 0x22, 0x24, 0xaa, 0x00, 0xbb, 0x00, 0xcd, 0x00, 0x02, 0x1c, + 0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57, 0x69, 0x05, 0xb9, 0x60, 0xfe, 0x14, + 0xea, 0xdb, 0x91, 0xb0, 0xcc, 0xf3, 0x48, 0x43, 0xda, 0xb9, 0x16, 0x17, + 0x3b, 0xb8, 0xc9, 0xcd, 0x02, 0x1d, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, + 0x37, 0xd3, 0x0f, 0x9e, 0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, + 0x69, 0x67, 0xcf, 0x33, 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: including undefined tags + // tcID: 337 + {SEC_OID_SHA224, + 337, + {0x30, 0x43, 0x22, 0x22, 0xaa, 0x02, 0xaa, 0xbb, 0x02, 0x1c, 0x1e, 0x41, + 0xb4, 0x79, 0xad, 0x57, 0x69, 0x05, 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, + 0x91, 0xb0, 0xcc, 0xf3, 0x48, 0x43, 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, + 0xc9, 0xcd, 0x02, 0x1d, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, + 0x0f, 0x9e, 0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69, 0x67, + 0xcf, 0x33, 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: including undefined tags + // tcID: 338 + {SEC_OID_SHA224, + 338, + {0x30, 0x45, 0x02, 0x1c, 0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57, 0x69, 0x05, + 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, 0xcc, 0xf3, 0x48, 0x43, + 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd, 0x22, 0x25, 0xaa, 0x00, + 0xbb, 0x00, 0xcd, 0x00, 0x02, 0x1d, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, + 0x37, 0xd3, 0x0f, 0x9e, 0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, + 0x69, 0x67, 0xcf, 0x33, 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: including undefined tags + // tcID: 339 + {SEC_OID_SHA224, + 339, + {0x30, 0x43, 0x02, 0x1c, 0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57, 0x69, 0x05, + 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, 0xcc, 0xf3, 0x48, 0x43, + 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd, 0x22, 0x23, 0xaa, 0x02, + 0xaa, 0xbb, 0x02, 0x1d, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, + 0x0f, 0x9e, 0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69, 0x67, + 0xcf, 0x33, 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: truncated length of sequence + // tcID: 340 + {SEC_OID_SHA224, + 340, + {0x30, 0x81}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: using composition with indefinite length + // tcID: 341 + {SEC_OID_SHA224, + 341, + {0x30, 0x80, 0x30, 0x3d, 0x02, 0x1c, 0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57, + 0x69, 0x05, 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, 0xcc, 0xf3, + 0x48, 0x43, 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd, 0x02, 0x1d, + 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, 0x0f, 0x9e, 0xf4, 0x1d, + 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69, 0x67, 0xcf, 0x33, 0x65, 0x81, + 0x3f, 0xe8, 0x78, 0x62, 0x36, 0x00, 0x00}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: using composition with indefinite length + // tcID: 342 + {SEC_OID_SHA224, + 342, + {0x30, 0x41, 0x22, 0x80, 0x02, 0x1c, 0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57, + 0x69, 0x05, 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, 0xcc, 0xf3, + 0x48, 0x43, 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd, 0x00, 0x00, + 0x02, 0x1d, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, 0x0f, 0x9e, + 0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69, 0x67, 0xcf, 0x33, + 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: using composition with indefinite length + // tcID: 343 + {SEC_OID_SHA224, + 343, + {0x30, 0x41, 0x02, 0x1c, 0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57, 0x69, 0x05, + 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, 0xcc, 0xf3, 0x48, 0x43, + 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd, 0x22, 0x80, 0x02, 0x1d, + 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, 0x0f, 0x9e, 0xf4, 0x1d, + 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69, 0x67, 0xcf, 0x33, 0x65, 0x81, + 0x3f, 0xe8, 0x78, 0x62, 0x36, 0x00, 0x00}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: using composition with wrong tag + // tcID: 344 + {SEC_OID_SHA224, + 344, + {0x30, 0x80, 0x31, 0x3d, 0x02, 0x1c, 0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57, + 0x69, 0x05, 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, 0xcc, 0xf3, + 0x48, 0x43, 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd, 0x02, 0x1d, + 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, 0x0f, 0x9e, 0xf4, 0x1d, + 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69, 0x67, 0xcf, 0x33, 0x65, 0x81, + 0x3f, 0xe8, 0x78, 0x62, 0x36, 0x00, 0x00}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: using composition with wrong tag + // tcID: 345 + {SEC_OID_SHA224, + 345, + {0x30, 0x41, 0x22, 0x80, 0x03, 0x1c, 0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57, + 0x69, 0x05, 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, 0xcc, 0xf3, + 0x48, 0x43, 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd, 0x00, 0x00, + 0x02, 0x1d, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, 0x0f, 0x9e, + 0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69, 0x67, 0xcf, 0x33, + 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: using composition with wrong tag + // tcID: 346 + {SEC_OID_SHA224, + 346, + {0x30, 0x41, 0x02, 0x1c, 0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57, 0x69, 0x05, + 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, 0xcc, 0xf3, 0x48, 0x43, + 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd, 0x22, 0x80, 0x03, 0x1d, + 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, 0x0f, 0x9e, 0xf4, 0x1d, + 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69, 0x67, 0xcf, 0x33, 0x65, 0x81, + 0x3f, 0xe8, 0x78, 0x62, 0x36, 0x00, 0x00}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: Replacing sequence with NULL + // tcID: 347 + {SEC_OID_SHA224, + 347, + {0x05, 0x00}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: changing tag value of sequence + // tcID: 348 + {SEC_OID_SHA224, + 348, + {0x2e, 0x3d, 0x02, 0x1c, 0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57, 0x69, + 0x05, 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, 0xcc, 0xf3, + 0x48, 0x43, 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd, 0x02, + 0x1d, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, 0x0f, 0x9e, + 0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69, 0x67, 0xcf, + 0x33, 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: changing tag value of sequence + // tcID: 349 + {SEC_OID_SHA224, + 349, + {0x2f, 0x3d, 0x02, 0x1c, 0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57, 0x69, + 0x05, 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, 0xcc, 0xf3, + 0x48, 0x43, 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd, 0x02, + 0x1d, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, 0x0f, 0x9e, + 0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69, 0x67, 0xcf, + 0x33, 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: changing tag value of sequence + // tcID: 350 + {SEC_OID_SHA224, + 350, + {0x31, 0x3d, 0x02, 0x1c, 0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57, 0x69, + 0x05, 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, 0xcc, 0xf3, + 0x48, 0x43, 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd, 0x02, + 0x1d, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, 0x0f, 0x9e, + 0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69, 0x67, 0xcf, + 0x33, 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: changing tag value of sequence + // tcID: 351 + {SEC_OID_SHA224, + 351, + {0x32, 0x3d, 0x02, 0x1c, 0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57, 0x69, + 0x05, 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, 0xcc, 0xf3, + 0x48, 0x43, 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd, 0x02, + 0x1d, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, 0x0f, 0x9e, + 0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69, 0x67, 0xcf, + 0x33, 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: changing tag value of sequence + // tcID: 352 + {SEC_OID_SHA224, + 352, + {0xff, 0x3d, 0x02, 0x1c, 0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57, 0x69, + 0x05, 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, 0xcc, 0xf3, + 0x48, 0x43, 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd, 0x02, + 0x1d, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, 0x0f, 0x9e, + 0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69, 0x67, 0xcf, + 0x33, 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: dropping value of sequence + // tcID: 353 + {SEC_OID_SHA224, + 353, + {0x30, 0x00}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: using composition for sequence + // tcID: 354 + {SEC_OID_SHA224, + 354, + {0x30, 0x41, 0x30, 0x01, 0x02, 0x30, 0x3c, 0x1c, 0x1e, 0x41, 0xb4, 0x79, + 0xad, 0x57, 0x69, 0x05, 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, + 0xcc, 0xf3, 0x48, 0x43, 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd, + 0x02, 0x1d, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, 0x0f, 0x9e, + 0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69, 0x67, 0xcf, 0x33, + 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: truncated sequence + // tcID: 355 + {SEC_OID_SHA224, + 355, + {0x30, 0x3c, 0x02, 0x1c, 0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57, 0x69, + 0x05, 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, 0xcc, 0xf3, + 0x48, 0x43, 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd, 0x02, + 0x1d, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, 0x0f, 0x9e, + 0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69, 0x67, 0xcf, + 0x33, 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: truncated sequence + // tcID: 356 + {SEC_OID_SHA224, + 356, + {0x30, 0x3c, 0x1c, 0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57, 0x69, 0x05, + 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, 0xcc, 0xf3, 0x48, + 0x43, 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd, 0x02, 0x1d, + 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, 0x0f, 0x9e, 0xf4, + 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69, 0x67, 0xcf, 0x33, + 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: indefinite length + // tcID: 357 + {SEC_OID_SHA224, + 357, + {0x30, 0x80, 0x02, 0x1c, 0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57, 0x69, + 0x05, 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, 0xcc, 0xf3, + 0x48, 0x43, 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd, 0x02, + 0x1d, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, 0x0f, 0x9e, + 0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69, 0x67, 0xcf, + 0x33, 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36, 0x00, 0x00}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: indefinite length with truncated delimiter + // tcID: 358 + {SEC_OID_SHA224, + 358, + {0x30, 0x80, 0x02, 0x1c, 0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57, 0x69, + 0x05, 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, 0xcc, 0xf3, + 0x48, 0x43, 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd, 0x02, + 0x1d, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, 0x0f, 0x9e, + 0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69, 0x67, 0xcf, + 0x33, 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36, 0x00}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: indefinite length with additional element + // tcID: 359 + {SEC_OID_SHA224, + 359, + {0x30, 0x80, 0x02, 0x1c, 0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57, 0x69, 0x05, + 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, 0xcc, 0xf3, 0x48, 0x43, + 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd, 0x02, 0x1d, 0x00, 0xad, + 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, 0x0f, 0x9e, 0xf4, 0x1d, 0xd4, 0x24, + 0xa4, 0xe1, 0xc8, 0xf1, 0x69, 0x67, 0xcf, 0x33, 0x65, 0x81, 0x3f, 0xe8, + 0x78, 0x62, 0x36, 0x05, 0x00, 0x00, 0x00}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: indefinite length with truncated element + // tcID: 360 + {SEC_OID_SHA224, + 360, + {0x30, 0x80, 0x02, 0x1c, 0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57, 0x69, 0x05, + 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, 0xcc, 0xf3, 0x48, 0x43, + 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd, 0x02, 0x1d, 0x00, 0xad, + 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, 0x0f, 0x9e, 0xf4, 0x1d, 0xd4, 0x24, + 0xa4, 0xe1, 0xc8, 0xf1, 0x69, 0x67, 0xcf, 0x33, 0x65, 0x81, 0x3f, 0xe8, + 0x78, 0x62, 0x36, 0x06, 0x08, 0x11, 0x22, 0x00, 0x00}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: indefinite length with garbage + // tcID: 361 + {SEC_OID_SHA224, + 361, + {0x30, 0x80, 0x02, 0x1c, 0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57, 0x69, 0x05, + 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, 0xcc, 0xf3, 0x48, 0x43, + 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd, 0x02, 0x1d, 0x00, 0xad, + 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, 0x0f, 0x9e, 0xf4, 0x1d, 0xd4, 0x24, + 0xa4, 0xe1, 0xc8, 0xf1, 0x69, 0x67, 0xcf, 0x33, 0x65, 0x81, 0x3f, 0xe8, + 0x78, 0x62, 0x36, 0x00, 0x00, 0xfe, 0x02, 0xbe, 0xef}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: indefinite length with nonempty EOC + // tcID: 362 + {SEC_OID_SHA224, + 362, + {0x30, 0x80, 0x02, 0x1c, 0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57, 0x69, 0x05, + 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, 0xcc, 0xf3, 0x48, 0x43, + 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd, 0x02, 0x1d, 0x00, 0xad, + 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, 0x0f, 0x9e, 0xf4, 0x1d, 0xd4, 0x24, + 0xa4, 0xe1, 0xc8, 0xf1, 0x69, 0x67, 0xcf, 0x33, 0x65, 0x81, 0x3f, 0xe8, + 0x78, 0x62, 0x36, 0x00, 0x02, 0xbe, 0xef}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: prepend empty sequence + // tcID: 363 + {SEC_OID_SHA224, + 363, + {0x30, 0x3f, 0x30, 0x00, 0x02, 0x1c, 0x1e, 0x41, 0xb4, 0x79, 0xad, + 0x57, 0x69, 0x05, 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, + 0xcc, 0xf3, 0x48, 0x43, 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, + 0xcd, 0x02, 0x1d, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, + 0x0f, 0x9e, 0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69, + 0x67, 0xcf, 0x33, 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: append empty sequence + // tcID: 364 + {SEC_OID_SHA224, + 364, + {0x30, 0x3f, 0x02, 0x1c, 0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57, 0x69, + 0x05, 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, 0xcc, 0xf3, + 0x48, 0x43, 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd, 0x02, + 0x1d, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, 0x0f, 0x9e, + 0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69, 0x67, 0xcf, + 0x33, 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36, 0x30, 0x00}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: append garbage with high tag number + // tcID: 365 + {SEC_OID_SHA224, + 365, + {0x30, 0x40, 0x02, 0x1c, 0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57, 0x69, + 0x05, 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, 0xcc, 0xf3, + 0x48, 0x43, 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd, 0x02, + 0x1d, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, 0x0f, 0x9e, + 0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69, 0x67, 0xcf, + 0x33, 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36, 0xbf, 0x7f, 0x00}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: sequence of sequence + // tcID: 366 + {SEC_OID_SHA224, + 366, + {0x30, 0x3f, 0x30, 0x3d, 0x02, 0x1c, 0x1e, 0x41, 0xb4, 0x79, 0xad, + 0x57, 0x69, 0x05, 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, + 0xcc, 0xf3, 0x48, 0x43, 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, + 0xcd, 0x02, 0x1d, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, + 0x0f, 0x9e, 0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69, + 0x67, 0xcf, 0x33, 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: truncated sequence: removed last 1 elements + // tcID: 367 + {SEC_OID_SHA224, + 367, + {0x30, 0x1e, 0x02, 0x1c, 0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57, 0x69, + 0x05, 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, 0xcc, 0xf3, + 0x48, 0x43, 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: repeating element in sequence + // tcID: 368 + {SEC_OID_SHA224, + 368, + {0x30, 0x5c, 0x02, 0x1c, 0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57, 0x69, 0x05, + 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, 0xcc, 0xf3, 0x48, 0x43, + 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd, 0x02, 0x1d, 0x00, 0xad, + 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, 0x0f, 0x9e, 0xf4, 0x1d, 0xd4, 0x24, + 0xa4, 0xe1, 0xc8, 0xf1, 0x69, 0x67, 0xcf, 0x33, 0x65, 0x81, 0x3f, 0xe8, + 0x78, 0x62, 0x36, 0x02, 0x1d, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, + 0xd3, 0x0f, 0x9e, 0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69, + 0x67, 0xcf, 0x33, 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: long form encoding of length of integer + // tcID: 369 + {SEC_OID_SHA224, + 369, + {0x30, 0x3e, 0x02, 0x81, 0x1c, 0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57, + 0x69, 0x05, 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, 0xcc, + 0xf3, 0x48, 0x43, 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd, + 0x02, 0x1d, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, 0x0f, + 0x9e, 0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69, 0x67, + 0xcf, 0x33, 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: long form encoding of length of integer + // tcID: 370 + {SEC_OID_SHA224, + 370, + {0x30, 0x3e, 0x02, 0x1c, 0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57, 0x69, + 0x05, 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, 0xcc, 0xf3, + 0x48, 0x43, 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd, 0x02, + 0x81, 0x1d, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, 0x0f, + 0x9e, 0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69, 0x67, + 0xcf, 0x33, 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: length of integer contains leading 0 + // tcID: 371 + {SEC_OID_SHA224, + 371, + {0x30, 0x3f, 0x02, 0x82, 0x00, 0x1c, 0x1e, 0x41, 0xb4, 0x79, 0xad, + 0x57, 0x69, 0x05, 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, + 0xcc, 0xf3, 0x48, 0x43, 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, + 0xcd, 0x02, 0x1d, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, + 0x0f, 0x9e, 0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69, + 0x67, 0xcf, 0x33, 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: length of integer contains leading 0 + // tcID: 372 + {SEC_OID_SHA224, + 372, + {0x30, 0x3f, 0x02, 0x1c, 0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57, 0x69, + 0x05, 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, 0xcc, 0xf3, + 0x48, 0x43, 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd, 0x02, + 0x82, 0x00, 0x1d, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, + 0x0f, 0x9e, 0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69, + 0x67, 0xcf, 0x33, 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: wrong length of integer + // tcID: 373 + {SEC_OID_SHA224, + 373, + {0x30, 0x3d, 0x02, 0x1d, 0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57, 0x69, + 0x05, 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, 0xcc, 0xf3, + 0x48, 0x43, 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd, 0x02, + 0x1d, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, 0x0f, 0x9e, + 0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69, 0x67, 0xcf, + 0x33, 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: wrong length of integer + // tcID: 374 + {SEC_OID_SHA224, + 374, + {0x30, 0x3d, 0x02, 0x1b, 0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57, 0x69, + 0x05, 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, 0xcc, 0xf3, + 0x48, 0x43, 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd, 0x02, + 0x1d, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, 0x0f, 0x9e, + 0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69, 0x67, 0xcf, + 0x33, 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: wrong length of integer + // tcID: 375 + {SEC_OID_SHA224, + 375, + {0x30, 0x3d, 0x02, 0x1c, 0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57, 0x69, + 0x05, 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, 0xcc, 0xf3, + 0x48, 0x43, 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd, 0x02, + 0x1e, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, 0x0f, 0x9e, + 0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69, 0x67, 0xcf, + 0x33, 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: wrong length of integer + // tcID: 376 + {SEC_OID_SHA224, + 376, + {0x30, 0x3d, 0x02, 0x1c, 0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57, 0x69, + 0x05, 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, 0xcc, 0xf3, + 0x48, 0x43, 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd, 0x02, + 0x1c, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, 0x0f, 0x9e, + 0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69, 0x67, 0xcf, + 0x33, 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: uint32 overflow in length of integer + // tcID: 377 + {SEC_OID_SHA224, + 377, + {0x30, 0x42, 0x02, 0x85, 0x01, 0x00, 0x00, 0x00, 0x1c, 0x1e, 0x41, 0xb4, + 0x79, 0xad, 0x57, 0x69, 0x05, 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, + 0xb0, 0xcc, 0xf3, 0x48, 0x43, 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, + 0xcd, 0x02, 0x1d, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, 0x0f, + 0x9e, 0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69, 0x67, 0xcf, + 0x33, 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: uint32 overflow in length of integer + // tcID: 378 + {SEC_OID_SHA224, + 378, + {0x30, 0x42, 0x02, 0x1c, 0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57, 0x69, 0x05, + 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, 0xcc, 0xf3, 0x48, 0x43, + 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd, 0x02, 0x85, 0x01, 0x00, + 0x00, 0x00, 0x1d, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, 0x0f, + 0x9e, 0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69, 0x67, 0xcf, + 0x33, 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: uint64 overflow in length of integer + // tcID: 379 + {SEC_OID_SHA224, + 379, + {0x30, 0x46, 0x02, 0x89, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, + 0x1c, 0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57, 0x69, 0x05, 0xb9, 0x60, 0xfe, + 0x14, 0xea, 0xdb, 0x91, 0xb0, 0xcc, 0xf3, 0x48, 0x43, 0xda, 0xb9, 0x16, + 0x17, 0x3b, 0xb8, 0xc9, 0xcd, 0x02, 0x1d, 0x00, 0xad, 0xe6, 0x59, 0x88, + 0xd2, 0x37, 0xd3, 0x0f, 0x9e, 0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, + 0xf1, 0x69, 0x67, 0xcf, 0x33, 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: uint64 overflow in length of integer + // tcID: 380 + {SEC_OID_SHA224, + 380, + {0x30, 0x46, 0x02, 0x1c, 0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57, 0x69, 0x05, + 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, 0xcc, 0xf3, 0x48, 0x43, + 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd, 0x02, 0x89, 0x01, 0x00, + 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x1d, 0x00, 0xad, 0xe6, 0x59, 0x88, + 0xd2, 0x37, 0xd3, 0x0f, 0x9e, 0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, + 0xf1, 0x69, 0x67, 0xcf, 0x33, 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: length of integer = 2**31 - 1 + // tcID: 381 + {SEC_OID_SHA224, + 381, + {0x30, 0x41, 0x02, 0x84, 0x7f, 0xff, 0xff, 0xff, 0x1e, 0x41, 0xb4, 0x79, + 0xad, 0x57, 0x69, 0x05, 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, + 0xcc, 0xf3, 0x48, 0x43, 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd, + 0x02, 0x1d, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, 0x0f, 0x9e, + 0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69, 0x67, 0xcf, 0x33, + 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: length of integer = 2**31 - 1 + // tcID: 382 + {SEC_OID_SHA224, + 382, + {0x30, 0x41, 0x02, 0x1c, 0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57, 0x69, 0x05, + 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, 0xcc, 0xf3, 0x48, 0x43, + 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd, 0x02, 0x84, 0x7f, 0xff, + 0xff, 0xff, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, 0x0f, 0x9e, + 0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69, 0x67, 0xcf, 0x33, + 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: length of integer = 2**32 - 1 + // tcID: 383 + {SEC_OID_SHA224, + 383, + {0x30, 0x41, 0x02, 0x84, 0xff, 0xff, 0xff, 0xff, 0x1e, 0x41, 0xb4, 0x79, + 0xad, 0x57, 0x69, 0x05, 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, + 0xcc, 0xf3, 0x48, 0x43, 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd, + 0x02, 0x1d, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, 0x0f, 0x9e, + 0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69, 0x67, 0xcf, 0x33, + 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: length of integer = 2**32 - 1 + // tcID: 384 + {SEC_OID_SHA224, + 384, + {0x30, 0x41, 0x02, 0x1c, 0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57, 0x69, 0x05, + 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, 0xcc, 0xf3, 0x48, 0x43, + 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd, 0x02, 0x84, 0xff, 0xff, + 0xff, 0xff, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, 0x0f, 0x9e, + 0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69, 0x67, 0xcf, 0x33, + 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: length of integer = 2**40 - 1 + // tcID: 385 + {SEC_OID_SHA224, + 385, + {0x30, 0x42, 0x02, 0x85, 0xff, 0xff, 0xff, 0xff, 0xff, 0x1e, 0x41, 0xb4, + 0x79, 0xad, 0x57, 0x69, 0x05, 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, + 0xb0, 0xcc, 0xf3, 0x48, 0x43, 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, + 0xcd, 0x02, 0x1d, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, 0x0f, + 0x9e, 0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69, 0x67, 0xcf, + 0x33, 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: length of integer = 2**40 - 1 + // tcID: 386 + {SEC_OID_SHA224, + 386, + {0x30, 0x42, 0x02, 0x1c, 0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57, 0x69, 0x05, + 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, 0xcc, 0xf3, 0x48, 0x43, + 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd, 0x02, 0x85, 0xff, 0xff, + 0xff, 0xff, 0xff, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, 0x0f, + 0x9e, 0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69, 0x67, 0xcf, + 0x33, 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: length of integer = 2**64 - 1 + // tcID: 387 + {SEC_OID_SHA224, + 387, + {0x30, 0x45, 0x02, 0x88, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, + 0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57, 0x69, 0x05, 0xb9, 0x60, 0xfe, 0x14, + 0xea, 0xdb, 0x91, 0xb0, 0xcc, 0xf3, 0x48, 0x43, 0xda, 0xb9, 0x16, 0x17, + 0x3b, 0xb8, 0xc9, 0xcd, 0x02, 0x1d, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, + 0x37, 0xd3, 0x0f, 0x9e, 0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, + 0x69, 0x67, 0xcf, 0x33, 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: length of integer = 2**64 - 1 + // tcID: 388 + {SEC_OID_SHA224, + 388, + {0x30, 0x45, 0x02, 0x1c, 0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57, 0x69, 0x05, + 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, 0xcc, 0xf3, 0x48, 0x43, + 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd, 0x02, 0x88, 0xff, 0xff, + 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, + 0x37, 0xd3, 0x0f, 0x9e, 0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, + 0x69, 0x67, 0xcf, 0x33, 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: incorrect length of integer + // tcID: 389 + {SEC_OID_SHA224, + 389, + {0x30, 0x3d, 0x02, 0xff, 0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57, 0x69, + 0x05, 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, 0xcc, 0xf3, + 0x48, 0x43, 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd, 0x02, + 0x1d, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, 0x0f, 0x9e, + 0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69, 0x67, 0xcf, + 0x33, 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: incorrect length of integer + // tcID: 390 + {SEC_OID_SHA224, + 390, + {0x30, 0x3d, 0x02, 0x1c, 0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57, 0x69, + 0x05, 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, 0xcc, 0xf3, + 0x48, 0x43, 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd, 0x02, + 0xff, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, 0x0f, 0x9e, + 0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69, 0x67, 0xcf, + 0x33, 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: removing integer + // tcID: 391 + {SEC_OID_SHA224, + 391, + {0x30, 0x1f, 0x02, 0x1d, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, + 0xd3, 0x0f, 0x9e, 0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, + 0x69, 0x67, 0xcf, 0x33, 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: lonely integer tag + // tcID: 392 + {SEC_OID_SHA224, + 392, + {0x30, 0x20, 0x02, 0x02, 0x1d, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, + 0xd3, 0x0f, 0x9e, 0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69, + 0x67, 0xcf, 0x33, 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: lonely integer tag + // tcID: 393 + {SEC_OID_SHA224, + 393, + {0x30, 0x1f, 0x02, 0x1c, 0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57, 0x69, + 0x05, 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, 0xcc, 0xf3, + 0x48, 0x43, 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd, 0x02}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: appending 0's to integer + // tcID: 394 + {SEC_OID_SHA224, + 394, + {0x30, 0x3f, 0x02, 0x1e, 0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57, 0x69, + 0x05, 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, 0xcc, 0xf3, + 0x48, 0x43, 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd, 0x00, + 0x00, 0x02, 0x1d, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, + 0x0f, 0x9e, 0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69, + 0x67, 0xcf, 0x33, 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: appending 0's to integer + // tcID: 395 + {SEC_OID_SHA224, + 395, + {0x30, 0x3f, 0x02, 0x1c, 0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57, 0x69, + 0x05, 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, 0xcc, 0xf3, + 0x48, 0x43, 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd, 0x02, + 0x1f, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, 0x0f, 0x9e, + 0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69, 0x67, 0xcf, + 0x33, 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36, 0x00, 0x00}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: prepending 0's to integer + // tcID: 396 + {SEC_OID_SHA224, + 396, + {0x30, 0x3f, 0x02, 0x1e, 0x00, 0x00, 0x1e, 0x41, 0xb4, 0x79, 0xad, + 0x57, 0x69, 0x05, 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, + 0xcc, 0xf3, 0x48, 0x43, 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, + 0xcd, 0x02, 0x1d, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, + 0x0f, 0x9e, 0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69, + 0x67, 0xcf, 0x33, 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: prepending 0's to integer + // tcID: 397 + {SEC_OID_SHA224, + 397, + {0x30, 0x3f, 0x02, 0x1c, 0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57, 0x69, + 0x05, 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, 0xcc, 0xf3, + 0x48, 0x43, 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd, 0x02, + 0x1f, 0x00, 0x00, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, + 0x0f, 0x9e, 0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69, + 0x67, 0xcf, 0x33, 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: appending unused 0's to integer + // tcID: 398 + {SEC_OID_SHA224, + 398, + {0x30, 0x3f, 0x02, 0x1c, 0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57, 0x69, + 0x05, 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, 0xcc, 0xf3, + 0x48, 0x43, 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd, 0x00, + 0x00, 0x02, 0x1d, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, + 0x0f, 0x9e, 0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69, + 0x67, 0xcf, 0x33, 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: appending null value to integer + // tcID: 399 + {SEC_OID_SHA224, + 399, + {0x30, 0x3f, 0x02, 0x1e, 0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57, 0x69, + 0x05, 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, 0xcc, 0xf3, + 0x48, 0x43, 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd, 0x05, + 0x00, 0x02, 0x1d, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, + 0x0f, 0x9e, 0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69, + 0x67, 0xcf, 0x33, 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: appending null value to integer + // tcID: 400 + {SEC_OID_SHA224, + 400, + {0x30, 0x3f, 0x02, 0x1c, 0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57, 0x69, + 0x05, 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, 0xcc, 0xf3, + 0x48, 0x43, 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd, 0x02, + 0x1f, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, 0x0f, 0x9e, + 0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69, 0x67, 0xcf, + 0x33, 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36, 0x05, 0x00}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: truncated length of integer + // tcID: 401 + {SEC_OID_SHA224, + 401, + {0x30, 0x21, 0x02, 0x81, 0x02, 0x1d, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, + 0x37, 0xd3, 0x0f, 0x9e, 0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, + 0x69, 0x67, 0xcf, 0x33, 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: truncated length of integer + // tcID: 402 + {SEC_OID_SHA224, + 402, + {0x30, 0x20, 0x02, 0x1c, 0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57, 0x69, 0x05, + 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, 0xcc, 0xf3, 0x48, 0x43, + 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd, 0x02, 0x81}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: Replacing integer with NULL + // tcID: 403 + {SEC_OID_SHA224, + 403, + {0x30, 0x21, 0x05, 0x00, 0x02, 0x1d, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, + 0x37, 0xd3, 0x0f, 0x9e, 0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, + 0x69, 0x67, 0xcf, 0x33, 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: Replacing integer with NULL + // tcID: 404 + {SEC_OID_SHA224, + 404, + {0x30, 0x20, 0x02, 0x1c, 0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57, 0x69, 0x05, + 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, 0xcc, 0xf3, 0x48, 0x43, + 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd, 0x05, 0x00}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: changing tag value of integer + // tcID: 405 + {SEC_OID_SHA224, + 405, + {0x30, 0x3d, 0x00, 0x1c, 0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57, 0x69, + 0x05, 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, 0xcc, 0xf3, + 0x48, 0x43, 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd, 0x02, + 0x1d, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, 0x0f, 0x9e, + 0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69, 0x67, 0xcf, + 0x33, 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: changing tag value of integer + // tcID: 406 + {SEC_OID_SHA224, + 406, + {0x30, 0x3d, 0x01, 0x1c, 0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57, 0x69, + 0x05, 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, 0xcc, 0xf3, + 0x48, 0x43, 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd, 0x02, + 0x1d, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, 0x0f, 0x9e, + 0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69, 0x67, 0xcf, + 0x33, 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: changing tag value of integer + // tcID: 407 + {SEC_OID_SHA224, + 407, + {0x30, 0x3d, 0x03, 0x1c, 0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57, 0x69, + 0x05, 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, 0xcc, 0xf3, + 0x48, 0x43, 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd, 0x02, + 0x1d, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, 0x0f, 0x9e, + 0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69, 0x67, 0xcf, + 0x33, 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: changing tag value of integer + // tcID: 408 + {SEC_OID_SHA224, + 408, + {0x30, 0x3d, 0x04, 0x1c, 0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57, 0x69, + 0x05, 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, 0xcc, 0xf3, + 0x48, 0x43, 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd, 0x02, + 0x1d, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, 0x0f, 0x9e, + 0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69, 0x67, 0xcf, + 0x33, 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: changing tag value of integer + // tcID: 409 + {SEC_OID_SHA224, + 409, + {0x30, 0x3d, 0xff, 0x1c, 0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57, 0x69, + 0x05, 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, 0xcc, 0xf3, + 0x48, 0x43, 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd, 0x02, + 0x1d, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, 0x0f, 0x9e, + 0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69, 0x67, 0xcf, + 0x33, 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: changing tag value of integer + // tcID: 410 + {SEC_OID_SHA224, + 410, + {0x30, 0x3d, 0x02, 0x1c, 0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57, 0x69, + 0x05, 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, 0xcc, 0xf3, + 0x48, 0x43, 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd, 0x00, + 0x1d, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, 0x0f, 0x9e, + 0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69, 0x67, 0xcf, + 0x33, 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: changing tag value of integer + // tcID: 411 + {SEC_OID_SHA224, + 411, + {0x30, 0x3d, 0x02, 0x1c, 0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57, 0x69, + 0x05, 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, 0xcc, 0xf3, + 0x48, 0x43, 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd, 0x01, + 0x1d, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, 0x0f, 0x9e, + 0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69, 0x67, 0xcf, + 0x33, 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: changing tag value of integer + // tcID: 412 + {SEC_OID_SHA224, + 412, + {0x30, 0x3d, 0x02, 0x1c, 0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57, 0x69, + 0x05, 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, 0xcc, 0xf3, + 0x48, 0x43, 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd, 0x03, + 0x1d, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, 0x0f, 0x9e, + 0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69, 0x67, 0xcf, + 0x33, 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: changing tag value of integer + // tcID: 413 + {SEC_OID_SHA224, + 413, + {0x30, 0x3d, 0x02, 0x1c, 0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57, 0x69, + 0x05, 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, 0xcc, 0xf3, + 0x48, 0x43, 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd, 0x04, + 0x1d, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, 0x0f, 0x9e, + 0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69, 0x67, 0xcf, + 0x33, 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: changing tag value of integer + // tcID: 414 + {SEC_OID_SHA224, + 414, + {0x30, 0x3d, 0x02, 0x1c, 0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57, 0x69, + 0x05, 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, 0xcc, 0xf3, + 0x48, 0x43, 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd, 0xff, + 0x1d, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, 0x0f, 0x9e, + 0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69, 0x67, 0xcf, + 0x33, 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: dropping value of integer + // tcID: 415 + {SEC_OID_SHA224, + 415, + {0x30, 0x21, 0x02, 0x00, 0x02, 0x1d, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, + 0x37, 0xd3, 0x0f, 0x9e, 0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, + 0x69, 0x67, 0xcf, 0x33, 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: dropping value of integer + // tcID: 416 + {SEC_OID_SHA224, + 416, + {0x30, 0x20, 0x02, 0x1c, 0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57, 0x69, 0x05, + 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, 0xcc, 0xf3, 0x48, 0x43, + 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd, 0x02, 0x00}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: using composition for integer + // tcID: 417 + {SEC_OID_SHA224, + 417, + {0x30, 0x41, 0x22, 0x20, 0x02, 0x01, 0x1e, 0x02, 0x1b, 0x41, 0xb4, 0x79, + 0xad, 0x57, 0x69, 0x05, 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, + 0xcc, 0xf3, 0x48, 0x43, 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd, + 0x02, 0x1d, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, 0x0f, 0x9e, + 0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69, 0x67, 0xcf, 0x33, + 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: using composition for integer + // tcID: 418 + {SEC_OID_SHA224, + 418, + {0x30, 0x41, 0x02, 0x1c, 0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57, 0x69, 0x05, + 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, 0xcc, 0xf3, 0x48, 0x43, + 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd, 0x22, 0x21, 0x02, 0x01, + 0x00, 0x02, 0x1c, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, 0x0f, 0x9e, + 0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69, 0x67, 0xcf, 0x33, + 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: modify first byte of integer + // tcID: 419 + {SEC_OID_SHA224, + 419, + {0x30, 0x3d, 0x02, 0x1c, 0x1c, 0x41, 0xb4, 0x79, 0xad, 0x57, 0x69, + 0x05, 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, 0xcc, 0xf3, + 0x48, 0x43, 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd, 0x02, + 0x1d, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, 0x0f, 0x9e, + 0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69, 0x67, 0xcf, + 0x33, 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: modify first byte of integer + // tcID: 420 + {SEC_OID_SHA224, + 420, + {0x30, 0x3d, 0x02, 0x1c, 0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57, 0x69, + 0x05, 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, 0xcc, 0xf3, + 0x48, 0x43, 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd, 0x02, + 0x1d, 0x02, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, 0x0f, 0x9e, + 0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69, 0x67, 0xcf, + 0x33, 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: modify last byte of integer + // tcID: 421 + {SEC_OID_SHA224, + 421, + {0x30, 0x3d, 0x02, 0x1c, 0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57, 0x69, + 0x05, 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, 0xcc, 0xf3, + 0x48, 0x43, 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0x4d, 0x02, + 0x1d, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, 0x0f, 0x9e, + 0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69, 0x67, 0xcf, + 0x33, 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: modify last byte of integer + // tcID: 422 + {SEC_OID_SHA224, + 422, + {0x30, 0x3d, 0x02, 0x1c, 0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57, 0x69, + 0x05, 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, 0xcc, 0xf3, + 0x48, 0x43, 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd, 0x02, + 0x1d, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, 0x0f, 0x9e, + 0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69, 0x67, 0xcf, + 0x33, 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0xb6}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: truncated integer + // tcID: 423 + {SEC_OID_SHA224, + 423, + {0x30, 0x3c, 0x02, 0x1b, 0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57, 0x69, + 0x05, 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, 0xcc, 0xf3, + 0x48, 0x43, 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0x02, 0x1d, + 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, 0x0f, 0x9e, 0xf4, + 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69, 0x67, 0xcf, 0x33, + 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: truncated integer + // tcID: 424 + {SEC_OID_SHA224, + 424, + {0x30, 0x3c, 0x02, 0x1b, 0x41, 0xb4, 0x79, 0xad, 0x57, 0x69, 0x05, + 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, 0xcc, 0xf3, 0x48, + 0x43, 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd, 0x02, 0x1d, + 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, 0x0f, 0x9e, 0xf4, + 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69, 0x67, 0xcf, 0x33, + 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: truncated integer + // tcID: 425 + {SEC_OID_SHA224, + 425, + {0x30, 0x3c, 0x02, 0x1c, 0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57, 0x69, + 0x05, 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, 0xcc, 0xf3, + 0x48, 0x43, 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd, 0x02, + 0x1c, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, 0x0f, 0x9e, + 0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69, 0x67, 0xcf, + 0x33, 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: leading ff in integer + // tcID: 426 + {SEC_OID_SHA224, + 426, + {0x30, 0x3e, 0x02, 0x1d, 0xff, 0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57, + 0x69, 0x05, 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, 0xcc, + 0xf3, 0x48, 0x43, 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd, + 0x02, 0x1d, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, 0x0f, + 0x9e, 0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69, 0x67, + 0xcf, 0x33, 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: leading ff in integer + // tcID: 427 + {SEC_OID_SHA224, + 427, + {0x30, 0x3e, 0x02, 0x1c, 0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57, 0x69, + 0x05, 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, 0xcc, 0xf3, + 0x48, 0x43, 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd, 0x02, + 0x1e, 0xff, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, 0x0f, + 0x9e, 0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69, 0x67, + 0xcf, 0x33, 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: replaced integer by infinity + // tcID: 428 + {SEC_OID_SHA224, + 428, + {0x30, 0x22, 0x09, 0x01, 0x80, 0x02, 0x1d, 0x00, 0xad, 0xe6, 0x59, 0x88, + 0xd2, 0x37, 0xd3, 0x0f, 0x9e, 0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, + 0xf1, 0x69, 0x67, 0xcf, 0x33, 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: replaced integer by infinity + // tcID: 429 + {SEC_OID_SHA224, + 429, + {0x30, 0x21, 0x02, 0x1c, 0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57, 0x69, 0x05, + 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, 0xcc, 0xf3, 0x48, 0x43, + 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd, 0x09, 0x01, 0x80}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: replacing integer with zero + // tcID: 430 + {SEC_OID_SHA224, + 430, + {0x30, 0x22, 0x02, 0x01, 0x00, 0x02, 0x1d, 0x00, 0xad, 0xe6, 0x59, 0x88, + 0xd2, 0x37, 0xd3, 0x0f, 0x9e, 0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, + 0xf1, 0x69, 0x67, 0xcf, 0x33, 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: replacing integer with zero + // tcID: 431 + {SEC_OID_SHA224, + 431, + {0x30, 0x21, 0x02, 0x1c, 0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57, 0x69, 0x05, + 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, 0xcc, 0xf3, 0x48, 0x43, + 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd, 0x02, 0x01, 0x00}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: Modified r or s, e.g. by adding or subtracting the group order + // tcID: 432 + {SEC_OID_SHA224, + 432, + {0x30, 0x3e, 0x02, 0x1d, 0x00, 0xd9, 0x38, 0x4b, 0x20, 0x32, 0xd0, + 0x60, 0xe5, 0x98, 0x48, 0xf8, 0x7c, 0xb4, 0x53, 0x59, 0x36, 0xbc, + 0x25, 0xfa, 0x77, 0x95, 0x9e, 0x96, 0xd7, 0xf8, 0x8e, 0x33, 0x2a, + 0x02, 0x1d, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, 0x0f, + 0x9e, 0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69, 0x67, + 0xcf, 0x33, 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: Modified r or s, e.g. by adding or subtracting the group order + // tcID: 433 + {SEC_OID_SHA224, + 433, + {0x30, 0x3e, 0x02, 0x1d, 0xff, 0x63, 0x4b, 0x1d, 0xd3, 0x27, 0xde, + 0x71, 0x25, 0xda, 0x79, 0x03, 0xad, 0x21, 0x63, 0xca, 0x2a, 0xdd, + 0xc0, 0x96, 0x10, 0x1f, 0xd3, 0x95, 0x56, 0x7e, 0xe3, 0x60, 0x70, + 0x02, 0x1d, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, 0x0f, + 0x9e, 0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69, 0x67, + 0xcf, 0x33, 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: Modified r or s, e.g. by adding or subtracting the group order + // tcID: 434 + {SEC_OID_SHA224, + 434, + {0x30, 0x3d, 0x02, 0x1c, 0xe1, 0xbe, 0x4b, 0x86, 0x52, 0xa8, 0x96, + 0xfa, 0x46, 0x9f, 0x01, 0xeb, 0x15, 0x24, 0x6e, 0x4f, 0x33, 0x0c, + 0xb7, 0xbc, 0x25, 0x46, 0xe9, 0xe8, 0xc4, 0x47, 0x36, 0x33, 0x02, + 0x1d, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, 0x0f, 0x9e, + 0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69, 0x67, 0xcf, + 0x33, 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: Modified r or s, e.g. by adding or subtracting the group order + // tcID: 435 + {SEC_OID_SHA224, + 435, + {0x30, 0x3e, 0x02, 0x1d, 0x00, 0x9c, 0xb4, 0xe2, 0x2c, 0xd8, 0x21, + 0x8e, 0xda, 0x25, 0x86, 0xfc, 0x52, 0xde, 0x9c, 0x35, 0xd5, 0x22, + 0x3f, 0x69, 0xef, 0xe0, 0x2c, 0x6a, 0xa9, 0x81, 0x1c, 0x9f, 0x90, + 0x02, 0x1d, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, 0x0f, + 0x9e, 0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69, 0x67, + 0xcf, 0x33, 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: Modified r or s, e.g. by adding or subtracting the group order + // tcID: 436 + {SEC_OID_SHA224, + 436, + {0x30, 0x3e, 0x02, 0x1d, 0xff, 0x26, 0xc7, 0xb4, 0xdf, 0xcd, 0x2f, + 0x9f, 0x1a, 0x67, 0xb7, 0x07, 0x83, 0x4b, 0xac, 0xa6, 0xc9, 0x43, + 0xda, 0x05, 0x88, 0x6a, 0x61, 0x69, 0x28, 0x07, 0x71, 0xcc, 0xd6, + 0x02, 0x1d, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, 0x0f, + 0x9e, 0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69, 0x67, + 0xcf, 0x33, 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: Modified r or s, e.g. by adding or subtracting the group order + // tcID: 437 + {SEC_OID_SHA224, + 437, + {0x30, 0x3e, 0x02, 0x1d, 0x01, 0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57, + 0x69, 0x05, 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, 0xcc, + 0xf3, 0x48, 0x43, 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd, + 0x02, 0x1d, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, 0x0f, + 0x9e, 0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69, 0x67, + 0xcf, 0x33, 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: Modified r or s, e.g. by adding or subtracting the group order + // tcID: 438 + {SEC_OID_SHA224, + 438, + {0x30, 0x3e, 0x02, 0x1d, 0x00, 0xe1, 0xbe, 0x4b, 0x86, 0x52, 0xa8, + 0x96, 0xfa, 0x46, 0x9f, 0x01, 0xeb, 0x15, 0x24, 0x6e, 0x4f, 0x33, + 0x0c, 0xb7, 0xbc, 0x25, 0x46, 0xe9, 0xe8, 0xc4, 0x47, 0x36, 0x33, + 0x02, 0x1d, 0x00, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, 0x0f, + 0x9e, 0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69, 0x67, + 0xcf, 0x33, 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: Modified r or s, e.g. by adding or subtracting the group order + // tcID: 439 + {SEC_OID_SHA224, + 439, + {0x30, 0x3d, 0x02, 0x1c, 0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57, 0x69, + 0x05, 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, 0xcc, 0xf3, + 0x48, 0x43, 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd, 0x02, + 0x1d, 0x01, 0x68, 0xdc, 0xf0, 0x2f, 0x57, 0xb0, 0xca, 0xef, 0x7d, + 0xdc, 0x18, 0x3b, 0xee, 0x1c, 0xa9, 0x4e, 0xe0, 0x9c, 0x1a, 0x02, + 0xee, 0x4b, 0x02, 0x00, 0xa5, 0x4d, 0xcb, 0x93}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: Modified r or s, e.g. by adding or subtracting the group order + // tcID: 440 + {SEC_OID_SHA224, + 440, + {0x30, 0x3c, 0x02, 0x1c, 0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57, 0x69, + 0x05, 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, 0xcc, 0xf3, + 0x48, 0x43, 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd, 0x02, + 0x1c, 0xf2, 0xef, 0xc2, 0xe2, 0x4c, 0xbe, 0xdb, 0x2f, 0xc0, 0x0c, + 0x23, 0x6c, 0x5b, 0x2d, 0x1a, 0x43, 0x02, 0x36, 0xb5, 0x9b, 0x78, + 0x80, 0x00, 0x7f, 0x2b, 0xa2, 0xf8, 0xd9}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: Modified r or s, e.g. by adding or subtracting the group order + // tcID: 441 + {SEC_OID_SHA224, + 441, + {0x30, 0x3d, 0x02, 0x1c, 0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57, 0x69, + 0x05, 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, 0xcc, 0xf3, + 0x48, 0x43, 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd, 0x02, + 0x1d, 0xff, 0x52, 0x19, 0xa6, 0x77, 0x2d, 0xc8, 0x2c, 0xf0, 0x61, + 0x0b, 0xe2, 0x2b, 0xdb, 0x5b, 0x1e, 0x37, 0x0e, 0x96, 0x98, 0x30, + 0xcc, 0x9a, 0x7e, 0xc0, 0x17, 0x87, 0x9d, 0xca}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: Modified r or s, e.g. by adding or subtracting the group order + // tcID: 442 + {SEC_OID_SHA224, + 442, + {0x30, 0x3c, 0x02, 0x1c, 0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57, 0x69, + 0x05, 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, 0xcc, 0xf3, + 0x48, 0x43, 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd, 0x02, + 0x1c, 0x0d, 0x10, 0x3d, 0x1d, 0xb3, 0x41, 0x24, 0xd0, 0x3f, 0xf3, + 0xdc, 0x93, 0xa4, 0xd2, 0xe5, 0xbc, 0xfd, 0xc9, 0x4a, 0x64, 0x87, + 0x7f, 0xff, 0x80, 0xd4, 0x5d, 0x07, 0x27}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: Modified r or s, e.g. by adding or subtracting the group order + // tcID: 443 + {SEC_OID_SHA224, + 443, + {0x30, 0x3d, 0x02, 0x1c, 0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57, 0x69, + 0x05, 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, 0xcc, 0xf3, + 0x48, 0x43, 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd, 0x02, + 0x1d, 0xfe, 0x97, 0x23, 0x0f, 0xd0, 0xa8, 0x4f, 0x35, 0x10, 0x82, + 0x23, 0xe7, 0xc4, 0x11, 0xe3, 0x56, 0xb1, 0x1f, 0x63, 0xe5, 0xfd, + 0x11, 0xb4, 0xfd, 0xff, 0x5a, 0xb2, 0x34, 0x6d}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: Modified r or s, e.g. by adding or subtracting the group order + // tcID: 444 + {SEC_OID_SHA224, + 444, + {0x30, 0x3d, 0x02, 0x1c, 0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57, 0x69, + 0x05, 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, 0xcc, 0xf3, + 0x48, 0x43, 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd, 0x02, + 0x1d, 0x01, 0xad, 0xe6, 0x59, 0x88, 0xd2, 0x37, 0xd3, 0x0f, 0x9e, + 0xf4, 0x1d, 0xd4, 0x24, 0xa4, 0xe1, 0xc8, 0xf1, 0x69, 0x67, 0xcf, + 0x33, 0x65, 0x81, 0x3f, 0xe8, 0x78, 0x62, 0x36}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: Modified r or s, e.g. by adding or subtracting the group order + // tcID: 445 + {SEC_OID_SHA224, + 445, + {0x30, 0x3c, 0x02, 0x1c, 0x1e, 0x41, 0xb4, 0x79, 0xad, 0x57, 0x69, + 0x05, 0xb9, 0x60, 0xfe, 0x14, 0xea, 0xdb, 0x91, 0xb0, 0xcc, 0xf3, + 0x48, 0x43, 0xda, 0xb9, 0x16, 0x17, 0x3b, 0xb8, 0xc9, 0xcd, 0x02, + 0x1c, 0x52, 0x19, 0xa6, 0x77, 0x2d, 0xc8, 0x2c, 0xf0, 0x61, 0x0b, + 0xe2, 0x2b, 0xdb, 0x5b, 0x1e, 0x37, 0x0e, 0x96, 0x98, 0x30, 0xcc, + 0x9a, 0x7e, 0xc0, 0x17, 0x87, 0x9d, 0xca}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 446 + {SEC_OID_SHA224, + 446, + {0x30, 0x22, 0x02, 0x01, 0x00, 0x02, 0x1d, 0xff, 0x45, 0x09, 0x69, 0x59, + 0x7a, 0x87, 0x08, 0x20, 0x21, 0x18, 0x05, 0x98, 0x36, 0x88, 0x38, 0x7a, + 0x10, 0xcd, 0x4d, 0xcc, 0x45, 0x1a, 0x7f, 0x3f, 0x43, 0x2a, 0x96, 0xa3}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 447 + {SEC_OID_SHA224, + 447, + {0x30, 0x06, 0x02, 0x01, 0x00, 0x02, 0x01, 0x00}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 448 + {SEC_OID_SHA224, + 448, + {0x30, 0x06, 0x02, 0x01, 0x00, 0x02, 0x01, 0x01}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 449 + {SEC_OID_SHA224, + 449, + {0x30, 0x06, 0x02, 0x01, 0x00, 0x02, 0x01, 0xff}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 450 + {SEC_OID_SHA224, + 450, + {0x30, 0x21, 0x02, 0x01, 0x00, 0x02, 0x1c, 0x5d, 0x7b, 0x4b, 0x53, 0x42, + 0xbc, 0x7b, 0xef, 0xef, 0x73, 0xfd, 0x33, 0xe4, 0xbb, 0xe3, 0xc2, 0xf7, + 0x99, 0x59, 0x19, 0xdd, 0x72, 0xc0, 0x60, 0x5e, 0x6a, 0xb4, 0xae}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 451 + {SEC_OID_SHA224, + 451, + {0x30, 0x21, 0x02, 0x01, 0x00, 0x02, 0x1c, 0x5d, 0x7b, 0x4b, 0x53, 0x42, + 0xbc, 0x7b, 0xef, 0xef, 0x73, 0xfd, 0x33, 0xe4, 0xbb, 0xe3, 0xc2, 0xf7, + 0x99, 0x59, 0x19, 0xdd, 0x72, 0xc0, 0x60, 0x5e, 0x6a, 0xb4, 0xaf}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 452 + {SEC_OID_SHA224, + 452, + {0x30, 0x22, 0x02, 0x01, 0x00, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, + 0x85, 0x78, 0xf7, 0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, + 0xef, 0x32, 0xb2, 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5c}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 453 + {SEC_OID_SHA224, + 453, + {0x30, 0x22, 0x02, 0x01, 0x00, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, + 0x85, 0x78, 0xf7, 0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, + 0xef, 0x32, 0xb2, 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5d}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 454 + {SEC_OID_SHA224, + 454, + {0x30, 0x22, 0x02, 0x01, 0x00, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, + 0x85, 0x78, 0xf7, 0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, + 0xef, 0x32, 0xb2, 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5e}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 455 + {SEC_OID_SHA224, + 455, + {0x30, 0x22, 0x02, 0x01, 0x00, 0x02, 0x1d, 0x01, 0x00, 0x00, 0x00, 0x00, + 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, + 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 456 + {SEC_OID_SHA224, + 456, + {0x30, 0x82, 0x01, 0x08, 0x02, 0x01, 0x00, 0x02, 0x82, 0x01, 0x01, 0x00, + 0x8f, 0x79, 0x35, 0xd9, 0xb9, 0xaa, 0xe9, 0xbf, 0xab, 0xed, 0x88, 0x7a, + 0xcf, 0x49, 0x51, 0xb6, 0xf3, 0x2e, 0xc5, 0x9e, 0x3b, 0xaf, 0x37, 0x18, + 0xe8, 0xea, 0xc4, 0x96, 0x1f, 0x3e, 0xfd, 0x36, 0x06, 0xe7, 0x43, 0x51, + 0xa9, 0xc4, 0x18, 0x33, 0x39, 0xb8, 0x09, 0xe7, 0xc2, 0xae, 0x1c, 0x53, + 0x9b, 0xa7, 0x47, 0x5b, 0x85, 0xd0, 0x11, 0xad, 0xb8, 0xb4, 0x79, 0x87, + 0x75, 0x49, 0x84, 0x69, 0x5c, 0xac, 0x0e, 0x8f, 0x14, 0xb3, 0x36, 0x08, + 0x28, 0xa2, 0x2f, 0xfa, 0x27, 0x11, 0x0a, 0x3d, 0x62, 0xa9, 0x93, 0x45, + 0x34, 0x09, 0xa0, 0xfe, 0x69, 0x6c, 0x46, 0x58, 0xf8, 0x4b, 0xdd, 0x20, + 0x81, 0x9c, 0x37, 0x09, 0xa0, 0x10, 0x57, 0xb1, 0x95, 0xad, 0xcd, 0x00, + 0x23, 0x3d, 0xba, 0x54, 0x84, 0xb6, 0x29, 0x1f, 0x9d, 0x64, 0x8e, 0xf8, + 0x83, 0x44, 0x86, 0x77, 0x97, 0x9c, 0xec, 0x04, 0xb4, 0x34, 0xa6, 0xac, + 0x2e, 0x75, 0xe9, 0x98, 0x5d, 0xe2, 0x3d, 0xb0, 0x29, 0x2f, 0xc1, 0x11, + 0x8c, 0x9f, 0xfa, 0x9d, 0x81, 0x81, 0xe7, 0x33, 0x8d, 0xb7, 0x92, 0xb7, + 0x30, 0xd7, 0xb9, 0xe3, 0x49, 0x59, 0x2f, 0x68, 0x09, 0x98, 0x72, 0x15, + 0x39, 0x15, 0xea, 0x3d, 0x6b, 0x8b, 0x46, 0x53, 0xc6, 0x33, 0x45, 0x8f, + 0x80, 0x3b, 0x32, 0xa4, 0xc2, 0xe0, 0xf2, 0x72, 0x90, 0x25, 0x6e, 0x4e, + 0x3f, 0x8a, 0x3b, 0x08, 0x38, 0xa1, 0xc4, 0x50, 0xe4, 0xe1, 0x8c, 0x1a, + 0x29, 0xa3, 0x7d, 0xdf, 0x5e, 0xa1, 0x43, 0xde, 0x4b, 0x66, 0xff, 0x04, + 0x90, 0x3e, 0xd5, 0xcf, 0x16, 0x23, 0xe1, 0x58, 0xd4, 0x87, 0xc6, 0x08, + 0xe9, 0x7f, 0x21, 0x1c, 0xd8, 0x1d, 0xca, 0x23, 0xcb, 0x6e, 0x38, 0x07, + 0x65, 0xf8, 0x22, 0xe3, 0x42, 0xbe, 0x48, 0x4c, 0x05, 0x76, 0x39, 0x39, + 0x60, 0x1c, 0xd6, 0x67}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 457 + {SEC_OID_SHA224, + 457, + {0x30, 0x08, 0x02, 0x01, 0x00, 0x09, 0x03, 0x80, 0xfe, 0x01}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 458 + {SEC_OID_SHA224, + 458, + {0x30, 0x06, 0x02, 0x01, 0x00, 0x09, 0x01, 0x42}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 459 + {SEC_OID_SHA224, + 459, + {0x30, 0x22, 0x02, 0x01, 0x01, 0x02, 0x1d, 0xff, 0x45, 0x09, 0x69, 0x59, + 0x7a, 0x87, 0x08, 0x20, 0x21, 0x18, 0x05, 0x98, 0x36, 0x88, 0x38, 0x7a, + 0x10, 0xcd, 0x4d, 0xcc, 0x45, 0x1a, 0x7f, 0x3f, 0x43, 0x2a, 0x96, 0xa3}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 460 + {SEC_OID_SHA224, + 460, + {0x30, 0x06, 0x02, 0x01, 0x01, 0x02, 0x01, 0x00}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 461 + {SEC_OID_SHA224, + 461, + {0x30, 0x06, 0x02, 0x01, 0x01, 0x02, 0x01, 0x01}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 462 + {SEC_OID_SHA224, + 462, + {0x30, 0x06, 0x02, 0x01, 0x01, 0x02, 0x01, 0xff}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 463 + {SEC_OID_SHA224, + 463, + {0x30, 0x21, 0x02, 0x01, 0x01, 0x02, 0x1c, 0x5d, 0x7b, 0x4b, 0x53, 0x42, + 0xbc, 0x7b, 0xef, 0xef, 0x73, 0xfd, 0x33, 0xe4, 0xbb, 0xe3, 0xc2, 0xf7, + 0x99, 0x59, 0x19, 0xdd, 0x72, 0xc0, 0x60, 0x5e, 0x6a, 0xb4, 0xae}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 464 + {SEC_OID_SHA224, + 464, + {0x30, 0x21, 0x02, 0x01, 0x01, 0x02, 0x1c, 0x5d, 0x7b, 0x4b, 0x53, 0x42, + 0xbc, 0x7b, 0xef, 0xef, 0x73, 0xfd, 0x33, 0xe4, 0xbb, 0xe3, 0xc2, 0xf7, + 0x99, 0x59, 0x19, 0xdd, 0x72, 0xc0, 0x60, 0x5e, 0x6a, 0xb4, 0xaf}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 465 + {SEC_OID_SHA224, + 465, + {0x30, 0x22, 0x02, 0x01, 0x01, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, + 0x85, 0x78, 0xf7, 0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, + 0xef, 0x32, 0xb2, 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5c}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 466 + {SEC_OID_SHA224, + 466, + {0x30, 0x22, 0x02, 0x01, 0x01, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, + 0x85, 0x78, 0xf7, 0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, + 0xef, 0x32, 0xb2, 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5d}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 467 + {SEC_OID_SHA224, + 467, + {0x30, 0x22, 0x02, 0x01, 0x01, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, + 0x85, 0x78, 0xf7, 0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, + 0xef, 0x32, 0xb2, 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5e}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 468 + {SEC_OID_SHA224, + 468, + {0x30, 0x22, 0x02, 0x01, 0x01, 0x02, 0x1d, 0x01, 0x00, 0x00, 0x00, 0x00, + 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, + 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 469 + {SEC_OID_SHA224, + 469, + {0x30, 0x82, 0x01, 0x08, 0x02, 0x01, 0x01, 0x02, 0x82, 0x01, 0x01, 0x00, + 0x8f, 0x79, 0x35, 0xd9, 0xb9, 0xaa, 0xe9, 0xbf, 0xab, 0xed, 0x88, 0x7a, + 0xcf, 0x49, 0x51, 0xb6, 0xf3, 0x2e, 0xc5, 0x9e, 0x3b, 0xaf, 0x37, 0x18, + 0xe8, 0xea, 0xc4, 0x96, 0x1f, 0x3e, 0xfd, 0x36, 0x06, 0xe7, 0x43, 0x51, + 0xa9, 0xc4, 0x18, 0x33, 0x39, 0xb8, 0x09, 0xe7, 0xc2, 0xae, 0x1c, 0x53, + 0x9b, 0xa7, 0x47, 0x5b, 0x85, 0xd0, 0x11, 0xad, 0xb8, 0xb4, 0x79, 0x87, + 0x75, 0x49, 0x84, 0x69, 0x5c, 0xac, 0x0e, 0x8f, 0x14, 0xb3, 0x36, 0x08, + 0x28, 0xa2, 0x2f, 0xfa, 0x27, 0x11, 0x0a, 0x3d, 0x62, 0xa9, 0x93, 0x45, + 0x34, 0x09, 0xa0, 0xfe, 0x69, 0x6c, 0x46, 0x58, 0xf8, 0x4b, 0xdd, 0x20, + 0x81, 0x9c, 0x37, 0x09, 0xa0, 0x10, 0x57, 0xb1, 0x95, 0xad, 0xcd, 0x00, + 0x23, 0x3d, 0xba, 0x54, 0x84, 0xb6, 0x29, 0x1f, 0x9d, 0x64, 0x8e, 0xf8, + 0x83, 0x44, 0x86, 0x77, 0x97, 0x9c, 0xec, 0x04, 0xb4, 0x34, 0xa6, 0xac, + 0x2e, 0x75, 0xe9, 0x98, 0x5d, 0xe2, 0x3d, 0xb0, 0x29, 0x2f, 0xc1, 0x11, + 0x8c, 0x9f, 0xfa, 0x9d, 0x81, 0x81, 0xe7, 0x33, 0x8d, 0xb7, 0x92, 0xb7, + 0x30, 0xd7, 0xb9, 0xe3, 0x49, 0x59, 0x2f, 0x68, 0x09, 0x98, 0x72, 0x15, + 0x39, 0x15, 0xea, 0x3d, 0x6b, 0x8b, 0x46, 0x53, 0xc6, 0x33, 0x45, 0x8f, + 0x80, 0x3b, 0x32, 0xa4, 0xc2, 0xe0, 0xf2, 0x72, 0x90, 0x25, 0x6e, 0x4e, + 0x3f, 0x8a, 0x3b, 0x08, 0x38, 0xa1, 0xc4, 0x50, 0xe4, 0xe1, 0x8c, 0x1a, + 0x29, 0xa3, 0x7d, 0xdf, 0x5e, 0xa1, 0x43, 0xde, 0x4b, 0x66, 0xff, 0x04, + 0x90, 0x3e, 0xd5, 0xcf, 0x16, 0x23, 0xe1, 0x58, 0xd4, 0x87, 0xc6, 0x08, + 0xe9, 0x7f, 0x21, 0x1c, 0xd8, 0x1d, 0xca, 0x23, 0xcb, 0x6e, 0x38, 0x07, + 0x65, 0xf8, 0x22, 0xe3, 0x42, 0xbe, 0x48, 0x4c, 0x05, 0x76, 0x39, 0x39, + 0x60, 0x1c, 0xd6, 0x67}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 470 + {SEC_OID_SHA224, + 470, + {0x30, 0x08, 0x02, 0x01, 0x01, 0x09, 0x03, 0x80, 0xfe, 0x01}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 471 + {SEC_OID_SHA224, + 471, + {0x30, 0x06, 0x02, 0x01, 0x01, 0x09, 0x01, 0x42}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 472 + {SEC_OID_SHA224, + 472, + {0x30, 0x22, 0x02, 0x01, 0xff, 0x02, 0x1d, 0xff, 0x45, 0x09, 0x69, 0x59, + 0x7a, 0x87, 0x08, 0x20, 0x21, 0x18, 0x05, 0x98, 0x36, 0x88, 0x38, 0x7a, + 0x10, 0xcd, 0x4d, 0xcc, 0x45, 0x1a, 0x7f, 0x3f, 0x43, 0x2a, 0x96, 0xa3}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 473 + {SEC_OID_SHA224, + 473, + {0x30, 0x06, 0x02, 0x01, 0xff, 0x02, 0x01, 0x00}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 474 + {SEC_OID_SHA224, + 474, + {0x30, 0x06, 0x02, 0x01, 0xff, 0x02, 0x01, 0x01}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 475 + {SEC_OID_SHA224, + 475, + {0x30, 0x06, 0x02, 0x01, 0xff, 0x02, 0x01, 0xff}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 476 + {SEC_OID_SHA224, + 476, + {0x30, 0x21, 0x02, 0x01, 0xff, 0x02, 0x1c, 0x5d, 0x7b, 0x4b, 0x53, 0x42, + 0xbc, 0x7b, 0xef, 0xef, 0x73, 0xfd, 0x33, 0xe4, 0xbb, 0xe3, 0xc2, 0xf7, + 0x99, 0x59, 0x19, 0xdd, 0x72, 0xc0, 0x60, 0x5e, 0x6a, 0xb4, 0xae}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 477 + {SEC_OID_SHA224, + 477, + {0x30, 0x21, 0x02, 0x01, 0xff, 0x02, 0x1c, 0x5d, 0x7b, 0x4b, 0x53, 0x42, + 0xbc, 0x7b, 0xef, 0xef, 0x73, 0xfd, 0x33, 0xe4, 0xbb, 0xe3, 0xc2, 0xf7, + 0x99, 0x59, 0x19, 0xdd, 0x72, 0xc0, 0x60, 0x5e, 0x6a, 0xb4, 0xaf}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 478 + {SEC_OID_SHA224, + 478, + {0x30, 0x22, 0x02, 0x01, 0xff, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, + 0x85, 0x78, 0xf7, 0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, + 0xef, 0x32, 0xb2, 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5c}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 479 + {SEC_OID_SHA224, + 479, + {0x30, 0x22, 0x02, 0x01, 0xff, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, + 0x85, 0x78, 0xf7, 0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, + 0xef, 0x32, 0xb2, 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5d}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 480 + {SEC_OID_SHA224, + 480, + {0x30, 0x22, 0x02, 0x01, 0xff, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, + 0x85, 0x78, 0xf7, 0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, + 0xef, 0x32, 0xb2, 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5e}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 481 + {SEC_OID_SHA224, + 481, + {0x30, 0x22, 0x02, 0x01, 0xff, 0x02, 0x1d, 0x01, 0x00, 0x00, 0x00, 0x00, + 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, + 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 482 + {SEC_OID_SHA224, + 482, + {0x30, 0x82, 0x01, 0x08, 0x02, 0x01, 0xff, 0x02, 0x82, 0x01, 0x01, 0x00, + 0x8f, 0x79, 0x35, 0xd9, 0xb9, 0xaa, 0xe9, 0xbf, 0xab, 0xed, 0x88, 0x7a, + 0xcf, 0x49, 0x51, 0xb6, 0xf3, 0x2e, 0xc5, 0x9e, 0x3b, 0xaf, 0x37, 0x18, + 0xe8, 0xea, 0xc4, 0x96, 0x1f, 0x3e, 0xfd, 0x36, 0x06, 0xe7, 0x43, 0x51, + 0xa9, 0xc4, 0x18, 0x33, 0x39, 0xb8, 0x09, 0xe7, 0xc2, 0xae, 0x1c, 0x53, + 0x9b, 0xa7, 0x47, 0x5b, 0x85, 0xd0, 0x11, 0xad, 0xb8, 0xb4, 0x79, 0x87, + 0x75, 0x49, 0x84, 0x69, 0x5c, 0xac, 0x0e, 0x8f, 0x14, 0xb3, 0x36, 0x08, + 0x28, 0xa2, 0x2f, 0xfa, 0x27, 0x11, 0x0a, 0x3d, 0x62, 0xa9, 0x93, 0x45, + 0x34, 0x09, 0xa0, 0xfe, 0x69, 0x6c, 0x46, 0x58, 0xf8, 0x4b, 0xdd, 0x20, + 0x81, 0x9c, 0x37, 0x09, 0xa0, 0x10, 0x57, 0xb1, 0x95, 0xad, 0xcd, 0x00, + 0x23, 0x3d, 0xba, 0x54, 0x84, 0xb6, 0x29, 0x1f, 0x9d, 0x64, 0x8e, 0xf8, + 0x83, 0x44, 0x86, 0x77, 0x97, 0x9c, 0xec, 0x04, 0xb4, 0x34, 0xa6, 0xac, + 0x2e, 0x75, 0xe9, 0x98, 0x5d, 0xe2, 0x3d, 0xb0, 0x29, 0x2f, 0xc1, 0x11, + 0x8c, 0x9f, 0xfa, 0x9d, 0x81, 0x81, 0xe7, 0x33, 0x8d, 0xb7, 0x92, 0xb7, + 0x30, 0xd7, 0xb9, 0xe3, 0x49, 0x59, 0x2f, 0x68, 0x09, 0x98, 0x72, 0x15, + 0x39, 0x15, 0xea, 0x3d, 0x6b, 0x8b, 0x46, 0x53, 0xc6, 0x33, 0x45, 0x8f, + 0x80, 0x3b, 0x32, 0xa4, 0xc2, 0xe0, 0xf2, 0x72, 0x90, 0x25, 0x6e, 0x4e, + 0x3f, 0x8a, 0x3b, 0x08, 0x38, 0xa1, 0xc4, 0x50, 0xe4, 0xe1, 0x8c, 0x1a, + 0x29, 0xa3, 0x7d, 0xdf, 0x5e, 0xa1, 0x43, 0xde, 0x4b, 0x66, 0xff, 0x04, + 0x90, 0x3e, 0xd5, 0xcf, 0x16, 0x23, 0xe1, 0x58, 0xd4, 0x87, 0xc6, 0x08, + 0xe9, 0x7f, 0x21, 0x1c, 0xd8, 0x1d, 0xca, 0x23, 0xcb, 0x6e, 0x38, 0x07, + 0x65, 0xf8, 0x22, 0xe3, 0x42, 0xbe, 0x48, 0x4c, 0x05, 0x76, 0x39, 0x39, + 0x60, 0x1c, 0xd6, 0x67}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 483 + {SEC_OID_SHA224, + 483, + {0x30, 0x08, 0x02, 0x01, 0xff, 0x09, 0x03, 0x80, 0xfe, 0x01}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 484 + {SEC_OID_SHA224, + 484, + {0x30, 0x06, 0x02, 0x01, 0xff, 0x09, 0x01, 0x42}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 485 + {SEC_OID_SHA224, + 485, + {0x30, 0x3d, 0x02, 0x1c, 0x5d, 0x7b, 0x4b, 0x53, 0x42, 0xbc, 0x7b, + 0xef, 0xef, 0x73, 0xfd, 0x33, 0xe4, 0xbb, 0xe3, 0xc2, 0xf7, 0x99, + 0x59, 0x19, 0xdd, 0x72, 0xc0, 0x60, 0x5e, 0x6a, 0xb4, 0xae, 0x02, + 0x1d, 0xff, 0x45, 0x09, 0x69, 0x59, 0x7a, 0x87, 0x08, 0x20, 0x21, + 0x18, 0x05, 0x98, 0x36, 0x88, 0x38, 0x7a, 0x10, 0xcd, 0x4d, 0xcc, + 0x45, 0x1a, 0x7f, 0x3f, 0x43, 0x2a, 0x96, 0xa3}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 486 + {SEC_OID_SHA224, + 486, + {0x30, 0x21, 0x02, 0x1c, 0x5d, 0x7b, 0x4b, 0x53, 0x42, 0xbc, 0x7b, 0xef, + 0xef, 0x73, 0xfd, 0x33, 0xe4, 0xbb, 0xe3, 0xc2, 0xf7, 0x99, 0x59, 0x19, + 0xdd, 0x72, 0xc0, 0x60, 0x5e, 0x6a, 0xb4, 0xae, 0x02, 0x01, 0x00}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 487 + {SEC_OID_SHA224, + 487, + {0x30, 0x21, 0x02, 0x1c, 0x5d, 0x7b, 0x4b, 0x53, 0x42, 0xbc, 0x7b, 0xef, + 0xef, 0x73, 0xfd, 0x33, 0xe4, 0xbb, 0xe3, 0xc2, 0xf7, 0x99, 0x59, 0x19, + 0xdd, 0x72, 0xc0, 0x60, 0x5e, 0x6a, 0xb4, 0xae, 0x02, 0x01, 0x01}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 488 + {SEC_OID_SHA224, + 488, + {0x30, 0x21, 0x02, 0x1c, 0x5d, 0x7b, 0x4b, 0x53, 0x42, 0xbc, 0x7b, 0xef, + 0xef, 0x73, 0xfd, 0x33, 0xe4, 0xbb, 0xe3, 0xc2, 0xf7, 0x99, 0x59, 0x19, + 0xdd, 0x72, 0xc0, 0x60, 0x5e, 0x6a, 0xb4, 0xae, 0x02, 0x01, 0xff}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 489 + {SEC_OID_SHA224, + 489, + {0x30, 0x3c, 0x02, 0x1c, 0x5d, 0x7b, 0x4b, 0x53, 0x42, 0xbc, 0x7b, + 0xef, 0xef, 0x73, 0xfd, 0x33, 0xe4, 0xbb, 0xe3, 0xc2, 0xf7, 0x99, + 0x59, 0x19, 0xdd, 0x72, 0xc0, 0x60, 0x5e, 0x6a, 0xb4, 0xae, 0x02, + 0x1c, 0x5d, 0x7b, 0x4b, 0x53, 0x42, 0xbc, 0x7b, 0xef, 0xef, 0x73, + 0xfd, 0x33, 0xe4, 0xbb, 0xe3, 0xc2, 0xf7, 0x99, 0x59, 0x19, 0xdd, + 0x72, 0xc0, 0x60, 0x5e, 0x6a, 0xb4, 0xae}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 490 + {SEC_OID_SHA224, + 490, + {0x30, 0x3c, 0x02, 0x1c, 0x5d, 0x7b, 0x4b, 0x53, 0x42, 0xbc, 0x7b, + 0xef, 0xef, 0x73, 0xfd, 0x33, 0xe4, 0xbb, 0xe3, 0xc2, 0xf7, 0x99, + 0x59, 0x19, 0xdd, 0x72, 0xc0, 0x60, 0x5e, 0x6a, 0xb4, 0xae, 0x02, + 0x1c, 0x5d, 0x7b, 0x4b, 0x53, 0x42, 0xbc, 0x7b, 0xef, 0xef, 0x73, + 0xfd, 0x33, 0xe4, 0xbb, 0xe3, 0xc2, 0xf7, 0x99, 0x59, 0x19, 0xdd, + 0x72, 0xc0, 0x60, 0x5e, 0x6a, 0xb4, 0xaf}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 491 + {SEC_OID_SHA224, + 491, + {0x30, 0x3d, 0x02, 0x1c, 0x5d, 0x7b, 0x4b, 0x53, 0x42, 0xbc, 0x7b, + 0xef, 0xef, 0x73, 0xfd, 0x33, 0xe4, 0xbb, 0xe3, 0xc2, 0xf7, 0x99, + 0x59, 0x19, 0xdd, 0x72, 0xc0, 0x60, 0x5e, 0x6a, 0xb4, 0xae, 0x02, + 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78, 0xf7, 0xdf, 0xde, + 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef, 0x32, 0xb2, 0x33, + 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5c}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 492 + {SEC_OID_SHA224, + 492, + {0x30, 0x3d, 0x02, 0x1c, 0x5d, 0x7b, 0x4b, 0x53, 0x42, 0xbc, 0x7b, + 0xef, 0xef, 0x73, 0xfd, 0x33, 0xe4, 0xbb, 0xe3, 0xc2, 0xf7, 0x99, + 0x59, 0x19, 0xdd, 0x72, 0xc0, 0x60, 0x5e, 0x6a, 0xb4, 0xae, 0x02, + 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78, 0xf7, 0xdf, 0xde, + 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef, 0x32, 0xb2, 0x33, + 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5d}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 493 + {SEC_OID_SHA224, + 493, + {0x30, 0x3d, 0x02, 0x1c, 0x5d, 0x7b, 0x4b, 0x53, 0x42, 0xbc, 0x7b, + 0xef, 0xef, 0x73, 0xfd, 0x33, 0xe4, 0xbb, 0xe3, 0xc2, 0xf7, 0x99, + 0x59, 0x19, 0xdd, 0x72, 0xc0, 0x60, 0x5e, 0x6a, 0xb4, 0xae, 0x02, + 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78, 0xf7, 0xdf, 0xde, + 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef, 0x32, 0xb2, 0x33, + 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5e}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 494 + {SEC_OID_SHA224, + 494, + {0x30, 0x3d, 0x02, 0x1c, 0x5d, 0x7b, 0x4b, 0x53, 0x42, 0xbc, 0x7b, + 0xef, 0xef, 0x73, 0xfd, 0x33, 0xe4, 0xbb, 0xe3, 0xc2, 0xf7, 0x99, + 0x59, 0x19, 0xdd, 0x72, 0xc0, 0x60, 0x5e, 0x6a, 0xb4, 0xae, 0x02, + 0x1d, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, + 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, + 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 495 + {SEC_OID_SHA224, + 495, + {0x30, 0x82, 0x01, 0x23, 0x02, 0x1c, 0x5d, 0x7b, 0x4b, 0x53, 0x42, 0xbc, + 0x7b, 0xef, 0xef, 0x73, 0xfd, 0x33, 0xe4, 0xbb, 0xe3, 0xc2, 0xf7, 0x99, + 0x59, 0x19, 0xdd, 0x72, 0xc0, 0x60, 0x5e, 0x6a, 0xb4, 0xae, 0x02, 0x82, + 0x01, 0x01, 0x00, 0x8f, 0x79, 0x35, 0xd9, 0xb9, 0xaa, 0xe9, 0xbf, 0xab, + 0xed, 0x88, 0x7a, 0xcf, 0x49, 0x51, 0xb6, 0xf3, 0x2e, 0xc5, 0x9e, 0x3b, + 0xaf, 0x37, 0x18, 0xe8, 0xea, 0xc4, 0x96, 0x1f, 0x3e, 0xfd, 0x36, 0x06, + 0xe7, 0x43, 0x51, 0xa9, 0xc4, 0x18, 0x33, 0x39, 0xb8, 0x09, 0xe7, 0xc2, + 0xae, 0x1c, 0x53, 0x9b, 0xa7, 0x47, 0x5b, 0x85, 0xd0, 0x11, 0xad, 0xb8, + 0xb4, 0x79, 0x87, 0x75, 0x49, 0x84, 0x69, 0x5c, 0xac, 0x0e, 0x8f, 0x14, + 0xb3, 0x36, 0x08, 0x28, 0xa2, 0x2f, 0xfa, 0x27, 0x11, 0x0a, 0x3d, 0x62, + 0xa9, 0x93, 0x45, 0x34, 0x09, 0xa0, 0xfe, 0x69, 0x6c, 0x46, 0x58, 0xf8, + 0x4b, 0xdd, 0x20, 0x81, 0x9c, 0x37, 0x09, 0xa0, 0x10, 0x57, 0xb1, 0x95, + 0xad, 0xcd, 0x00, 0x23, 0x3d, 0xba, 0x54, 0x84, 0xb6, 0x29, 0x1f, 0x9d, + 0x64, 0x8e, 0xf8, 0x83, 0x44, 0x86, 0x77, 0x97, 0x9c, 0xec, 0x04, 0xb4, + 0x34, 0xa6, 0xac, 0x2e, 0x75, 0xe9, 0x98, 0x5d, 0xe2, 0x3d, 0xb0, 0x29, + 0x2f, 0xc1, 0x11, 0x8c, 0x9f, 0xfa, 0x9d, 0x81, 0x81, 0xe7, 0x33, 0x8d, + 0xb7, 0x92, 0xb7, 0x30, 0xd7, 0xb9, 0xe3, 0x49, 0x59, 0x2f, 0x68, 0x09, + 0x98, 0x72, 0x15, 0x39, 0x15, 0xea, 0x3d, 0x6b, 0x8b, 0x46, 0x53, 0xc6, + 0x33, 0x45, 0x8f, 0x80, 0x3b, 0x32, 0xa4, 0xc2, 0xe0, 0xf2, 0x72, 0x90, + 0x25, 0x6e, 0x4e, 0x3f, 0x8a, 0x3b, 0x08, 0x38, 0xa1, 0xc4, 0x50, 0xe4, + 0xe1, 0x8c, 0x1a, 0x29, 0xa3, 0x7d, 0xdf, 0x5e, 0xa1, 0x43, 0xde, 0x4b, + 0x66, 0xff, 0x04, 0x90, 0x3e, 0xd5, 0xcf, 0x16, 0x23, 0xe1, 0x58, 0xd4, + 0x87, 0xc6, 0x08, 0xe9, 0x7f, 0x21, 0x1c, 0xd8, 0x1d, 0xca, 0x23, 0xcb, + 0x6e, 0x38, 0x07, 0x65, 0xf8, 0x22, 0xe3, 0x42, 0xbe, 0x48, 0x4c, 0x05, + 0x76, 0x39, 0x39, 0x60, 0x1c, 0xd6, 0x67}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 496 + {SEC_OID_SHA224, + 496, + {0x30, 0x23, 0x02, 0x1c, 0x5d, 0x7b, 0x4b, 0x53, 0x42, 0xbc, + 0x7b, 0xef, 0xef, 0x73, 0xfd, 0x33, 0xe4, 0xbb, 0xe3, 0xc2, + 0xf7, 0x99, 0x59, 0x19, 0xdd, 0x72, 0xc0, 0x60, 0x5e, 0x6a, + 0xb4, 0xae, 0x09, 0x03, 0x80, 0xfe, 0x01}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 497 + {SEC_OID_SHA224, + 497, + {0x30, 0x21, 0x02, 0x1c, 0x5d, 0x7b, 0x4b, 0x53, 0x42, 0xbc, 0x7b, 0xef, + 0xef, 0x73, 0xfd, 0x33, 0xe4, 0xbb, 0xe3, 0xc2, 0xf7, 0x99, 0x59, 0x19, + 0xdd, 0x72, 0xc0, 0x60, 0x5e, 0x6a, 0xb4, 0xae, 0x09, 0x01, 0x42}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 498 + {SEC_OID_SHA224, + 498, + {0x30, 0x3d, 0x02, 0x1c, 0x5d, 0x7b, 0x4b, 0x53, 0x42, 0xbc, 0x7b, + 0xef, 0xef, 0x73, 0xfd, 0x33, 0xe4, 0xbb, 0xe3, 0xc2, 0xf7, 0x99, + 0x59, 0x19, 0xdd, 0x72, 0xc0, 0x60, 0x5e, 0x6a, 0xb4, 0xaf, 0x02, + 0x1d, 0xff, 0x45, 0x09, 0x69, 0x59, 0x7a, 0x87, 0x08, 0x20, 0x21, + 0x18, 0x05, 0x98, 0x36, 0x88, 0x38, 0x7a, 0x10, 0xcd, 0x4d, 0xcc, + 0x45, 0x1a, 0x7f, 0x3f, 0x43, 0x2a, 0x96, 0xa3}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 499 + {SEC_OID_SHA224, + 499, + {0x30, 0x21, 0x02, 0x1c, 0x5d, 0x7b, 0x4b, 0x53, 0x42, 0xbc, 0x7b, 0xef, + 0xef, 0x73, 0xfd, 0x33, 0xe4, 0xbb, 0xe3, 0xc2, 0xf7, 0x99, 0x59, 0x19, + 0xdd, 0x72, 0xc0, 0x60, 0x5e, 0x6a, 0xb4, 0xaf, 0x02, 0x01, 0x00}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 500 + {SEC_OID_SHA224, + 500, + {0x30, 0x21, 0x02, 0x1c, 0x5d, 0x7b, 0x4b, 0x53, 0x42, 0xbc, 0x7b, 0xef, + 0xef, 0x73, 0xfd, 0x33, 0xe4, 0xbb, 0xe3, 0xc2, 0xf7, 0x99, 0x59, 0x19, + 0xdd, 0x72, 0xc0, 0x60, 0x5e, 0x6a, 0xb4, 0xaf, 0x02, 0x01, 0x01}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 501 + {SEC_OID_SHA224, + 501, + {0x30, 0x21, 0x02, 0x1c, 0x5d, 0x7b, 0x4b, 0x53, 0x42, 0xbc, 0x7b, 0xef, + 0xef, 0x73, 0xfd, 0x33, 0xe4, 0xbb, 0xe3, 0xc2, 0xf7, 0x99, 0x59, 0x19, + 0xdd, 0x72, 0xc0, 0x60, 0x5e, 0x6a, 0xb4, 0xaf, 0x02, 0x01, 0xff}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 502 + {SEC_OID_SHA224, + 502, + {0x30, 0x3c, 0x02, 0x1c, 0x5d, 0x7b, 0x4b, 0x53, 0x42, 0xbc, 0x7b, + 0xef, 0xef, 0x73, 0xfd, 0x33, 0xe4, 0xbb, 0xe3, 0xc2, 0xf7, 0x99, + 0x59, 0x19, 0xdd, 0x72, 0xc0, 0x60, 0x5e, 0x6a, 0xb4, 0xaf, 0x02, + 0x1c, 0x5d, 0x7b, 0x4b, 0x53, 0x42, 0xbc, 0x7b, 0xef, 0xef, 0x73, + 0xfd, 0x33, 0xe4, 0xbb, 0xe3, 0xc2, 0xf7, 0x99, 0x59, 0x19, 0xdd, + 0x72, 0xc0, 0x60, 0x5e, 0x6a, 0xb4, 0xae}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 503 + {SEC_OID_SHA224, + 503, + {0x30, 0x3c, 0x02, 0x1c, 0x5d, 0x7b, 0x4b, 0x53, 0x42, 0xbc, 0x7b, + 0xef, 0xef, 0x73, 0xfd, 0x33, 0xe4, 0xbb, 0xe3, 0xc2, 0xf7, 0x99, + 0x59, 0x19, 0xdd, 0x72, 0xc0, 0x60, 0x5e, 0x6a, 0xb4, 0xaf, 0x02, + 0x1c, 0x5d, 0x7b, 0x4b, 0x53, 0x42, 0xbc, 0x7b, 0xef, 0xef, 0x73, + 0xfd, 0x33, 0xe4, 0xbb, 0xe3, 0xc2, 0xf7, 0x99, 0x59, 0x19, 0xdd, + 0x72, 0xc0, 0x60, 0x5e, 0x6a, 0xb4, 0xaf}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 504 + {SEC_OID_SHA224, + 504, + {0x30, 0x3d, 0x02, 0x1c, 0x5d, 0x7b, 0x4b, 0x53, 0x42, 0xbc, 0x7b, + 0xef, 0xef, 0x73, 0xfd, 0x33, 0xe4, 0xbb, 0xe3, 0xc2, 0xf7, 0x99, + 0x59, 0x19, 0xdd, 0x72, 0xc0, 0x60, 0x5e, 0x6a, 0xb4, 0xaf, 0x02, + 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78, 0xf7, 0xdf, 0xde, + 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef, 0x32, 0xb2, 0x33, + 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5c}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 505 + {SEC_OID_SHA224, + 505, + {0x30, 0x3d, 0x02, 0x1c, 0x5d, 0x7b, 0x4b, 0x53, 0x42, 0xbc, 0x7b, + 0xef, 0xef, 0x73, 0xfd, 0x33, 0xe4, 0xbb, 0xe3, 0xc2, 0xf7, 0x99, + 0x59, 0x19, 0xdd, 0x72, 0xc0, 0x60, 0x5e, 0x6a, 0xb4, 0xaf, 0x02, + 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78, 0xf7, 0xdf, 0xde, + 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef, 0x32, 0xb2, 0x33, + 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5d}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 506 + {SEC_OID_SHA224, + 506, + {0x30, 0x3d, 0x02, 0x1c, 0x5d, 0x7b, 0x4b, 0x53, 0x42, 0xbc, 0x7b, + 0xef, 0xef, 0x73, 0xfd, 0x33, 0xe4, 0xbb, 0xe3, 0xc2, 0xf7, 0x99, + 0x59, 0x19, 0xdd, 0x72, 0xc0, 0x60, 0x5e, 0x6a, 0xb4, 0xaf, 0x02, + 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78, 0xf7, 0xdf, 0xde, + 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef, 0x32, 0xb2, 0x33, + 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5e}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 507 + {SEC_OID_SHA224, + 507, + {0x30, 0x3d, 0x02, 0x1c, 0x5d, 0x7b, 0x4b, 0x53, 0x42, 0xbc, 0x7b, + 0xef, 0xef, 0x73, 0xfd, 0x33, 0xe4, 0xbb, 0xe3, 0xc2, 0xf7, 0x99, + 0x59, 0x19, 0xdd, 0x72, 0xc0, 0x60, 0x5e, 0x6a, 0xb4, 0xaf, 0x02, + 0x1d, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, + 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, + 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 508 + {SEC_OID_SHA224, + 508, + {0x30, 0x82, 0x01, 0x23, 0x02, 0x1c, 0x5d, 0x7b, 0x4b, 0x53, 0x42, 0xbc, + 0x7b, 0xef, 0xef, 0x73, 0xfd, 0x33, 0xe4, 0xbb, 0xe3, 0xc2, 0xf7, 0x99, + 0x59, 0x19, 0xdd, 0x72, 0xc0, 0x60, 0x5e, 0x6a, 0xb4, 0xaf, 0x02, 0x82, + 0x01, 0x01, 0x00, 0x8f, 0x79, 0x35, 0xd9, 0xb9, 0xaa, 0xe9, 0xbf, 0xab, + 0xed, 0x88, 0x7a, 0xcf, 0x49, 0x51, 0xb6, 0xf3, 0x2e, 0xc5, 0x9e, 0x3b, + 0xaf, 0x37, 0x18, 0xe8, 0xea, 0xc4, 0x96, 0x1f, 0x3e, 0xfd, 0x36, 0x06, + 0xe7, 0x43, 0x51, 0xa9, 0xc4, 0x18, 0x33, 0x39, 0xb8, 0x09, 0xe7, 0xc2, + 0xae, 0x1c, 0x53, 0x9b, 0xa7, 0x47, 0x5b, 0x85, 0xd0, 0x11, 0xad, 0xb8, + 0xb4, 0x79, 0x87, 0x75, 0x49, 0x84, 0x69, 0x5c, 0xac, 0x0e, 0x8f, 0x14, + 0xb3, 0x36, 0x08, 0x28, 0xa2, 0x2f, 0xfa, 0x27, 0x11, 0x0a, 0x3d, 0x62, + 0xa9, 0x93, 0x45, 0x34, 0x09, 0xa0, 0xfe, 0x69, 0x6c, 0x46, 0x58, 0xf8, + 0x4b, 0xdd, 0x20, 0x81, 0x9c, 0x37, 0x09, 0xa0, 0x10, 0x57, 0xb1, 0x95, + 0xad, 0xcd, 0x00, 0x23, 0x3d, 0xba, 0x54, 0x84, 0xb6, 0x29, 0x1f, 0x9d, + 0x64, 0x8e, 0xf8, 0x83, 0x44, 0x86, 0x77, 0x97, 0x9c, 0xec, 0x04, 0xb4, + 0x34, 0xa6, 0xac, 0x2e, 0x75, 0xe9, 0x98, 0x5d, 0xe2, 0x3d, 0xb0, 0x29, + 0x2f, 0xc1, 0x11, 0x8c, 0x9f, 0xfa, 0x9d, 0x81, 0x81, 0xe7, 0x33, 0x8d, + 0xb7, 0x92, 0xb7, 0x30, 0xd7, 0xb9, 0xe3, 0x49, 0x59, 0x2f, 0x68, 0x09, + 0x98, 0x72, 0x15, 0x39, 0x15, 0xea, 0x3d, 0x6b, 0x8b, 0x46, 0x53, 0xc6, + 0x33, 0x45, 0x8f, 0x80, 0x3b, 0x32, 0xa4, 0xc2, 0xe0, 0xf2, 0x72, 0x90, + 0x25, 0x6e, 0x4e, 0x3f, 0x8a, 0x3b, 0x08, 0x38, 0xa1, 0xc4, 0x50, 0xe4, + 0xe1, 0x8c, 0x1a, 0x29, 0xa3, 0x7d, 0xdf, 0x5e, 0xa1, 0x43, 0xde, 0x4b, + 0x66, 0xff, 0x04, 0x90, 0x3e, 0xd5, 0xcf, 0x16, 0x23, 0xe1, 0x58, 0xd4, + 0x87, 0xc6, 0x08, 0xe9, 0x7f, 0x21, 0x1c, 0xd8, 0x1d, 0xca, 0x23, 0xcb, + 0x6e, 0x38, 0x07, 0x65, 0xf8, 0x22, 0xe3, 0x42, 0xbe, 0x48, 0x4c, 0x05, + 0x76, 0x39, 0x39, 0x60, 0x1c, 0xd6, 0x67}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 509 + {SEC_OID_SHA224, + 509, + {0x30, 0x23, 0x02, 0x1c, 0x5d, 0x7b, 0x4b, 0x53, 0x42, 0xbc, + 0x7b, 0xef, 0xef, 0x73, 0xfd, 0x33, 0xe4, 0xbb, 0xe3, 0xc2, + 0xf7, 0x99, 0x59, 0x19, 0xdd, 0x72, 0xc0, 0x60, 0x5e, 0x6a, + 0xb4, 0xaf, 0x09, 0x03, 0x80, 0xfe, 0x01}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 510 + {SEC_OID_SHA224, + 510, + {0x30, 0x21, 0x02, 0x1c, 0x5d, 0x7b, 0x4b, 0x53, 0x42, 0xbc, 0x7b, 0xef, + 0xef, 0x73, 0xfd, 0x33, 0xe4, 0xbb, 0xe3, 0xc2, 0xf7, 0x99, 0x59, 0x19, + 0xdd, 0x72, 0xc0, 0x60, 0x5e, 0x6a, 0xb4, 0xaf, 0x09, 0x01, 0x42}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 511 + {SEC_OID_SHA224, + 511, + {0x30, 0x3e, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78, + 0xf7, 0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef, + 0x32, 0xb2, 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5c, + 0x02, 0x1d, 0xff, 0x45, 0x09, 0x69, 0x59, 0x7a, 0x87, 0x08, 0x20, + 0x21, 0x18, 0x05, 0x98, 0x36, 0x88, 0x38, 0x7a, 0x10, 0xcd, 0x4d, + 0xcc, 0x45, 0x1a, 0x7f, 0x3f, 0x43, 0x2a, 0x96, 0xa3}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 512 + {SEC_OID_SHA224, + 512, + {0x30, 0x22, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78, 0xf7, + 0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef, 0x32, 0xb2, + 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5c, 0x02, 0x01, 0x00}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 513 + {SEC_OID_SHA224, + 513, + {0x30, 0x22, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78, 0xf7, + 0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef, 0x32, 0xb2, + 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5c, 0x02, 0x01, 0x01}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 514 + {SEC_OID_SHA224, + 514, + {0x30, 0x22, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78, 0xf7, + 0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef, 0x32, 0xb2, + 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5c, 0x02, 0x01, 0xff}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 515 + {SEC_OID_SHA224, + 515, + {0x30, 0x3d, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78, + 0xf7, 0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef, + 0x32, 0xb2, 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5c, + 0x02, 0x1c, 0x5d, 0x7b, 0x4b, 0x53, 0x42, 0xbc, 0x7b, 0xef, 0xef, + 0x73, 0xfd, 0x33, 0xe4, 0xbb, 0xe3, 0xc2, 0xf7, 0x99, 0x59, 0x19, + 0xdd, 0x72, 0xc0, 0x60, 0x5e, 0x6a, 0xb4, 0xae}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 516 + {SEC_OID_SHA224, + 516, + {0x30, 0x3d, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78, + 0xf7, 0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef, + 0x32, 0xb2, 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5c, + 0x02, 0x1c, 0x5d, 0x7b, 0x4b, 0x53, 0x42, 0xbc, 0x7b, 0xef, 0xef, + 0x73, 0xfd, 0x33, 0xe4, 0xbb, 0xe3, 0xc2, 0xf7, 0x99, 0x59, 0x19, + 0xdd, 0x72, 0xc0, 0x60, 0x5e, 0x6a, 0xb4, 0xaf}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 517 + {SEC_OID_SHA224, + 517, + {0x30, 0x3e, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78, + 0xf7, 0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef, + 0x32, 0xb2, 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5c, + 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78, 0xf7, 0xdf, + 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef, 0x32, 0xb2, + 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5c}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 518 + {SEC_OID_SHA224, + 518, + {0x30, 0x3e, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78, + 0xf7, 0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef, + 0x32, 0xb2, 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5c, + 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78, 0xf7, 0xdf, + 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef, 0x32, 0xb2, + 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5d}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 519 + {SEC_OID_SHA224, + 519, + {0x30, 0x3e, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78, + 0xf7, 0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef, + 0x32, 0xb2, 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5c, + 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78, 0xf7, 0xdf, + 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef, 0x32, 0xb2, + 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5e}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 520 + {SEC_OID_SHA224, + 520, + {0x30, 0x3e, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78, + 0xf7, 0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef, + 0x32, 0xb2, 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5c, + 0x02, 0x1d, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, + 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, + 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 521 + {SEC_OID_SHA224, + 521, + {0x30, 0x82, 0x01, 0x24, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, + 0x78, 0xf7, 0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef, + 0x32, 0xb2, 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5c, 0x02, + 0x82, 0x01, 0x01, 0x00, 0x8f, 0x79, 0x35, 0xd9, 0xb9, 0xaa, 0xe9, 0xbf, + 0xab, 0xed, 0x88, 0x7a, 0xcf, 0x49, 0x51, 0xb6, 0xf3, 0x2e, 0xc5, 0x9e, + 0x3b, 0xaf, 0x37, 0x18, 0xe8, 0xea, 0xc4, 0x96, 0x1f, 0x3e, 0xfd, 0x36, + 0x06, 0xe7, 0x43, 0x51, 0xa9, 0xc4, 0x18, 0x33, 0x39, 0xb8, 0x09, 0xe7, + 0xc2, 0xae, 0x1c, 0x53, 0x9b, 0xa7, 0x47, 0x5b, 0x85, 0xd0, 0x11, 0xad, + 0xb8, 0xb4, 0x79, 0x87, 0x75, 0x49, 0x84, 0x69, 0x5c, 0xac, 0x0e, 0x8f, + 0x14, 0xb3, 0x36, 0x08, 0x28, 0xa2, 0x2f, 0xfa, 0x27, 0x11, 0x0a, 0x3d, + 0x62, 0xa9, 0x93, 0x45, 0x34, 0x09, 0xa0, 0xfe, 0x69, 0x6c, 0x46, 0x58, + 0xf8, 0x4b, 0xdd, 0x20, 0x81, 0x9c, 0x37, 0x09, 0xa0, 0x10, 0x57, 0xb1, + 0x95, 0xad, 0xcd, 0x00, 0x23, 0x3d, 0xba, 0x54, 0x84, 0xb6, 0x29, 0x1f, + 0x9d, 0x64, 0x8e, 0xf8, 0x83, 0x44, 0x86, 0x77, 0x97, 0x9c, 0xec, 0x04, + 0xb4, 0x34, 0xa6, 0xac, 0x2e, 0x75, 0xe9, 0x98, 0x5d, 0xe2, 0x3d, 0xb0, + 0x29, 0x2f, 0xc1, 0x11, 0x8c, 0x9f, 0xfa, 0x9d, 0x81, 0x81, 0xe7, 0x33, + 0x8d, 0xb7, 0x92, 0xb7, 0x30, 0xd7, 0xb9, 0xe3, 0x49, 0x59, 0x2f, 0x68, + 0x09, 0x98, 0x72, 0x15, 0x39, 0x15, 0xea, 0x3d, 0x6b, 0x8b, 0x46, 0x53, + 0xc6, 0x33, 0x45, 0x8f, 0x80, 0x3b, 0x32, 0xa4, 0xc2, 0xe0, 0xf2, 0x72, + 0x90, 0x25, 0x6e, 0x4e, 0x3f, 0x8a, 0x3b, 0x08, 0x38, 0xa1, 0xc4, 0x50, + 0xe4, 0xe1, 0x8c, 0x1a, 0x29, 0xa3, 0x7d, 0xdf, 0x5e, 0xa1, 0x43, 0xde, + 0x4b, 0x66, 0xff, 0x04, 0x90, 0x3e, 0xd5, 0xcf, 0x16, 0x23, 0xe1, 0x58, + 0xd4, 0x87, 0xc6, 0x08, 0xe9, 0x7f, 0x21, 0x1c, 0xd8, 0x1d, 0xca, 0x23, + 0xcb, 0x6e, 0x38, 0x07, 0x65, 0xf8, 0x22, 0xe3, 0x42, 0xbe, 0x48, 0x4c, + 0x05, 0x76, 0x39, 0x39, 0x60, 0x1c, 0xd6, 0x67}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 522 + {SEC_OID_SHA224, + 522, + {0x30, 0x24, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, + 0x78, 0xf7, 0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, + 0x85, 0xef, 0x32, 0xb2, 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, + 0xd5, 0x69, 0x5c, 0x09, 0x03, 0x80, 0xfe, 0x01}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 523 + {SEC_OID_SHA224, + 523, + {0x30, 0x22, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78, 0xf7, + 0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef, 0x32, 0xb2, + 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5c, 0x09, 0x01, 0x42}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 524 + {SEC_OID_SHA224, + 524, + {0x30, 0x3e, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78, + 0xf7, 0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef, + 0x32, 0xb2, 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5d, + 0x02, 0x1d, 0xff, 0x45, 0x09, 0x69, 0x59, 0x7a, 0x87, 0x08, 0x20, + 0x21, 0x18, 0x05, 0x98, 0x36, 0x88, 0x38, 0x7a, 0x10, 0xcd, 0x4d, + 0xcc, 0x45, 0x1a, 0x7f, 0x3f, 0x43, 0x2a, 0x96, 0xa3}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 525 + {SEC_OID_SHA224, + 525, + {0x30, 0x22, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78, 0xf7, + 0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef, 0x32, 0xb2, + 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5d, 0x02, 0x01, 0x00}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 526 + {SEC_OID_SHA224, + 526, + {0x30, 0x22, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78, 0xf7, + 0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef, 0x32, 0xb2, + 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5d, 0x02, 0x01, 0x01}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 527 + {SEC_OID_SHA224, + 527, + {0x30, 0x22, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78, 0xf7, + 0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef, 0x32, 0xb2, + 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5d, 0x02, 0x01, 0xff}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 528 + {SEC_OID_SHA224, + 528, + {0x30, 0x3d, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78, + 0xf7, 0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef, + 0x32, 0xb2, 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5d, + 0x02, 0x1c, 0x5d, 0x7b, 0x4b, 0x53, 0x42, 0xbc, 0x7b, 0xef, 0xef, + 0x73, 0xfd, 0x33, 0xe4, 0xbb, 0xe3, 0xc2, 0xf7, 0x99, 0x59, 0x19, + 0xdd, 0x72, 0xc0, 0x60, 0x5e, 0x6a, 0xb4, 0xae}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 529 + {SEC_OID_SHA224, + 529, + {0x30, 0x3d, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78, + 0xf7, 0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef, + 0x32, 0xb2, 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5d, + 0x02, 0x1c, 0x5d, 0x7b, 0x4b, 0x53, 0x42, 0xbc, 0x7b, 0xef, 0xef, + 0x73, 0xfd, 0x33, 0xe4, 0xbb, 0xe3, 0xc2, 0xf7, 0x99, 0x59, 0x19, + 0xdd, 0x72, 0xc0, 0x60, 0x5e, 0x6a, 0xb4, 0xaf}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 530 + {SEC_OID_SHA224, + 530, + {0x30, 0x3e, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78, + 0xf7, 0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef, + 0x32, 0xb2, 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5d, + 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78, 0xf7, 0xdf, + 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef, 0x32, 0xb2, + 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5c}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 531 + {SEC_OID_SHA224, + 531, + {0x30, 0x3e, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78, + 0xf7, 0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef, + 0x32, 0xb2, 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5d, + 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78, 0xf7, 0xdf, + 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef, 0x32, 0xb2, + 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5d}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 532 + {SEC_OID_SHA224, + 532, + {0x30, 0x3e, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78, + 0xf7, 0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef, + 0x32, 0xb2, 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5d, + 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78, 0xf7, 0xdf, + 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef, 0x32, 0xb2, + 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5e}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 533 + {SEC_OID_SHA224, + 533, + {0x30, 0x3e, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78, + 0xf7, 0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef, + 0x32, 0xb2, 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5d, + 0x02, 0x1d, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, + 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, + 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 534 + {SEC_OID_SHA224, + 534, + {0x30, 0x82, 0x01, 0x24, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, + 0x78, 0xf7, 0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef, + 0x32, 0xb2, 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5d, 0x02, + 0x82, 0x01, 0x01, 0x00, 0x8f, 0x79, 0x35, 0xd9, 0xb9, 0xaa, 0xe9, 0xbf, + 0xab, 0xed, 0x88, 0x7a, 0xcf, 0x49, 0x51, 0xb6, 0xf3, 0x2e, 0xc5, 0x9e, + 0x3b, 0xaf, 0x37, 0x18, 0xe8, 0xea, 0xc4, 0x96, 0x1f, 0x3e, 0xfd, 0x36, + 0x06, 0xe7, 0x43, 0x51, 0xa9, 0xc4, 0x18, 0x33, 0x39, 0xb8, 0x09, 0xe7, + 0xc2, 0xae, 0x1c, 0x53, 0x9b, 0xa7, 0x47, 0x5b, 0x85, 0xd0, 0x11, 0xad, + 0xb8, 0xb4, 0x79, 0x87, 0x75, 0x49, 0x84, 0x69, 0x5c, 0xac, 0x0e, 0x8f, + 0x14, 0xb3, 0x36, 0x08, 0x28, 0xa2, 0x2f, 0xfa, 0x27, 0x11, 0x0a, 0x3d, + 0x62, 0xa9, 0x93, 0x45, 0x34, 0x09, 0xa0, 0xfe, 0x69, 0x6c, 0x46, 0x58, + 0xf8, 0x4b, 0xdd, 0x20, 0x81, 0x9c, 0x37, 0x09, 0xa0, 0x10, 0x57, 0xb1, + 0x95, 0xad, 0xcd, 0x00, 0x23, 0x3d, 0xba, 0x54, 0x84, 0xb6, 0x29, 0x1f, + 0x9d, 0x64, 0x8e, 0xf8, 0x83, 0x44, 0x86, 0x77, 0x97, 0x9c, 0xec, 0x04, + 0xb4, 0x34, 0xa6, 0xac, 0x2e, 0x75, 0xe9, 0x98, 0x5d, 0xe2, 0x3d, 0xb0, + 0x29, 0x2f, 0xc1, 0x11, 0x8c, 0x9f, 0xfa, 0x9d, 0x81, 0x81, 0xe7, 0x33, + 0x8d, 0xb7, 0x92, 0xb7, 0x30, 0xd7, 0xb9, 0xe3, 0x49, 0x59, 0x2f, 0x68, + 0x09, 0x98, 0x72, 0x15, 0x39, 0x15, 0xea, 0x3d, 0x6b, 0x8b, 0x46, 0x53, + 0xc6, 0x33, 0x45, 0x8f, 0x80, 0x3b, 0x32, 0xa4, 0xc2, 0xe0, 0xf2, 0x72, + 0x90, 0x25, 0x6e, 0x4e, 0x3f, 0x8a, 0x3b, 0x08, 0x38, 0xa1, 0xc4, 0x50, + 0xe4, 0xe1, 0x8c, 0x1a, 0x29, 0xa3, 0x7d, 0xdf, 0x5e, 0xa1, 0x43, 0xde, + 0x4b, 0x66, 0xff, 0x04, 0x90, 0x3e, 0xd5, 0xcf, 0x16, 0x23, 0xe1, 0x58, + 0xd4, 0x87, 0xc6, 0x08, 0xe9, 0x7f, 0x21, 0x1c, 0xd8, 0x1d, 0xca, 0x23, + 0xcb, 0x6e, 0x38, 0x07, 0x65, 0xf8, 0x22, 0xe3, 0x42, 0xbe, 0x48, 0x4c, + 0x05, 0x76, 0x39, 0x39, 0x60, 0x1c, 0xd6, 0x67}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 535 + {SEC_OID_SHA224, + 535, + {0x30, 0x24, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, + 0x78, 0xf7, 0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, + 0x85, 0xef, 0x32, 0xb2, 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, + 0xd5, 0x69, 0x5d, 0x09, 0x03, 0x80, 0xfe, 0x01}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 536 + {SEC_OID_SHA224, + 536, + {0x30, 0x22, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78, 0xf7, + 0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef, 0x32, 0xb2, + 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5d, 0x09, 0x01, 0x42}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 537 + {SEC_OID_SHA224, + 537, + {0x30, 0x3e, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78, + 0xf7, 0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef, + 0x32, 0xb2, 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5e, + 0x02, 0x1d, 0xff, 0x45, 0x09, 0x69, 0x59, 0x7a, 0x87, 0x08, 0x20, + 0x21, 0x18, 0x05, 0x98, 0x36, 0x88, 0x38, 0x7a, 0x10, 0xcd, 0x4d, + 0xcc, 0x45, 0x1a, 0x7f, 0x3f, 0x43, 0x2a, 0x96, 0xa3}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 538 + {SEC_OID_SHA224, + 538, + {0x30, 0x22, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78, 0xf7, + 0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef, 0x32, 0xb2, + 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5e, 0x02, 0x01, 0x00}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 539 + {SEC_OID_SHA224, + 539, + {0x30, 0x22, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78, 0xf7, + 0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef, 0x32, 0xb2, + 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5e, 0x02, 0x01, 0x01}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 540 + {SEC_OID_SHA224, + 540, + {0x30, 0x22, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78, 0xf7, + 0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef, 0x32, 0xb2, + 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5e, 0x02, 0x01, 0xff}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 541 + {SEC_OID_SHA224, + 541, + {0x30, 0x3d, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78, + 0xf7, 0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef, + 0x32, 0xb2, 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5e, + 0x02, 0x1c, 0x5d, 0x7b, 0x4b, 0x53, 0x42, 0xbc, 0x7b, 0xef, 0xef, + 0x73, 0xfd, 0x33, 0xe4, 0xbb, 0xe3, 0xc2, 0xf7, 0x99, 0x59, 0x19, + 0xdd, 0x72, 0xc0, 0x60, 0x5e, 0x6a, 0xb4, 0xae}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 542 + {SEC_OID_SHA224, + 542, + {0x30, 0x3d, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78, + 0xf7, 0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef, + 0x32, 0xb2, 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5e, + 0x02, 0x1c, 0x5d, 0x7b, 0x4b, 0x53, 0x42, 0xbc, 0x7b, 0xef, 0xef, + 0x73, 0xfd, 0x33, 0xe4, 0xbb, 0xe3, 0xc2, 0xf7, 0x99, 0x59, 0x19, + 0xdd, 0x72, 0xc0, 0x60, 0x5e, 0x6a, 0xb4, 0xaf}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 543 + {SEC_OID_SHA224, + 543, + {0x30, 0x3e, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78, + 0xf7, 0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef, + 0x32, 0xb2, 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5e, + 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78, 0xf7, 0xdf, + 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef, 0x32, 0xb2, + 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5c}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 544 + {SEC_OID_SHA224, + 544, + {0x30, 0x3e, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78, + 0xf7, 0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef, + 0x32, 0xb2, 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5e, + 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78, 0xf7, 0xdf, + 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef, 0x32, 0xb2, + 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5d}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 545 + {SEC_OID_SHA224, + 545, + {0x30, 0x3e, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78, + 0xf7, 0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef, + 0x32, 0xb2, 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5e, + 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78, 0xf7, 0xdf, + 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef, 0x32, 0xb2, + 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5e}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 546 + {SEC_OID_SHA224, + 546, + {0x30, 0x3e, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78, + 0xf7, 0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef, + 0x32, 0xb2, 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5e, + 0x02, 0x1d, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, + 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, + 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 547 + {SEC_OID_SHA224, + 547, + {0x30, 0x82, 0x01, 0x24, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, + 0x78, 0xf7, 0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef, + 0x32, 0xb2, 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5e, 0x02, + 0x82, 0x01, 0x01, 0x00, 0x8f, 0x79, 0x35, 0xd9, 0xb9, 0xaa, 0xe9, 0xbf, + 0xab, 0xed, 0x88, 0x7a, 0xcf, 0x49, 0x51, 0xb6, 0xf3, 0x2e, 0xc5, 0x9e, + 0x3b, 0xaf, 0x37, 0x18, 0xe8, 0xea, 0xc4, 0x96, 0x1f, 0x3e, 0xfd, 0x36, + 0x06, 0xe7, 0x43, 0x51, 0xa9, 0xc4, 0x18, 0x33, 0x39, 0xb8, 0x09, 0xe7, + 0xc2, 0xae, 0x1c, 0x53, 0x9b, 0xa7, 0x47, 0x5b, 0x85, 0xd0, 0x11, 0xad, + 0xb8, 0xb4, 0x79, 0x87, 0x75, 0x49, 0x84, 0x69, 0x5c, 0xac, 0x0e, 0x8f, + 0x14, 0xb3, 0x36, 0x08, 0x28, 0xa2, 0x2f, 0xfa, 0x27, 0x11, 0x0a, 0x3d, + 0x62, 0xa9, 0x93, 0x45, 0x34, 0x09, 0xa0, 0xfe, 0x69, 0x6c, 0x46, 0x58, + 0xf8, 0x4b, 0xdd, 0x20, 0x81, 0x9c, 0x37, 0x09, 0xa0, 0x10, 0x57, 0xb1, + 0x95, 0xad, 0xcd, 0x00, 0x23, 0x3d, 0xba, 0x54, 0x84, 0xb6, 0x29, 0x1f, + 0x9d, 0x64, 0x8e, 0xf8, 0x83, 0x44, 0x86, 0x77, 0x97, 0x9c, 0xec, 0x04, + 0xb4, 0x34, 0xa6, 0xac, 0x2e, 0x75, 0xe9, 0x98, 0x5d, 0xe2, 0x3d, 0xb0, + 0x29, 0x2f, 0xc1, 0x11, 0x8c, 0x9f, 0xfa, 0x9d, 0x81, 0x81, 0xe7, 0x33, + 0x8d, 0xb7, 0x92, 0xb7, 0x30, 0xd7, 0xb9, 0xe3, 0x49, 0x59, 0x2f, 0x68, + 0x09, 0x98, 0x72, 0x15, 0x39, 0x15, 0xea, 0x3d, 0x6b, 0x8b, 0x46, 0x53, + 0xc6, 0x33, 0x45, 0x8f, 0x80, 0x3b, 0x32, 0xa4, 0xc2, 0xe0, 0xf2, 0x72, + 0x90, 0x25, 0x6e, 0x4e, 0x3f, 0x8a, 0x3b, 0x08, 0x38, 0xa1, 0xc4, 0x50, + 0xe4, 0xe1, 0x8c, 0x1a, 0x29, 0xa3, 0x7d, 0xdf, 0x5e, 0xa1, 0x43, 0xde, + 0x4b, 0x66, 0xff, 0x04, 0x90, 0x3e, 0xd5, 0xcf, 0x16, 0x23, 0xe1, 0x58, + 0xd4, 0x87, 0xc6, 0x08, 0xe9, 0x7f, 0x21, 0x1c, 0xd8, 0x1d, 0xca, 0x23, + 0xcb, 0x6e, 0x38, 0x07, 0x65, 0xf8, 0x22, 0xe3, 0x42, 0xbe, 0x48, 0x4c, + 0x05, 0x76, 0x39, 0x39, 0x60, 0x1c, 0xd6, 0x67}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 548 + {SEC_OID_SHA224, + 548, + {0x30, 0x24, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, + 0x78, 0xf7, 0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, + 0x85, 0xef, 0x32, 0xb2, 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, + 0xd5, 0x69, 0x5e, 0x09, 0x03, 0x80, 0xfe, 0x01}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 549 + {SEC_OID_SHA224, + 549, + {0x30, 0x22, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78, 0xf7, + 0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef, 0x32, 0xb2, + 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5e, 0x09, 0x01, 0x42}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 550 + {SEC_OID_SHA224, + 550, + {0x30, 0x3e, 0x02, 0x1d, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, + 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, + 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, + 0x02, 0x1d, 0xff, 0x45, 0x09, 0x69, 0x59, 0x7a, 0x87, 0x08, 0x20, + 0x21, 0x18, 0x05, 0x98, 0x36, 0x88, 0x38, 0x7a, 0x10, 0xcd, 0x4d, + 0xcc, 0x45, 0x1a, 0x7f, 0x3f, 0x43, 0x2a, 0x96, 0xa3}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 551 + {SEC_OID_SHA224, + 551, + {0x30, 0x22, 0x02, 0x1d, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, + 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, + 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, 0x01, 0x00}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 552 + {SEC_OID_SHA224, + 552, + {0x30, 0x22, 0x02, 0x1d, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, + 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, + 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, 0x01, 0x01}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 553 + {SEC_OID_SHA224, + 553, + {0x30, 0x22, 0x02, 0x1d, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, + 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, + 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, 0x01, 0xff}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 554 + {SEC_OID_SHA224, + 554, + {0x30, 0x3d, 0x02, 0x1d, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, + 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, + 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, + 0x02, 0x1c, 0x5d, 0x7b, 0x4b, 0x53, 0x42, 0xbc, 0x7b, 0xef, 0xef, + 0x73, 0xfd, 0x33, 0xe4, 0xbb, 0xe3, 0xc2, 0xf7, 0x99, 0x59, 0x19, + 0xdd, 0x72, 0xc0, 0x60, 0x5e, 0x6a, 0xb4, 0xae}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 555 + {SEC_OID_SHA224, + 555, + {0x30, 0x3d, 0x02, 0x1d, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, + 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, + 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, + 0x02, 0x1c, 0x5d, 0x7b, 0x4b, 0x53, 0x42, 0xbc, 0x7b, 0xef, 0xef, + 0x73, 0xfd, 0x33, 0xe4, 0xbb, 0xe3, 0xc2, 0xf7, 0x99, 0x59, 0x19, + 0xdd, 0x72, 0xc0, 0x60, 0x5e, 0x6a, 0xb4, 0xaf}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 556 + {SEC_OID_SHA224, + 556, + {0x30, 0x3e, 0x02, 0x1d, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, + 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, + 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, + 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78, 0xf7, 0xdf, + 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef, 0x32, 0xb2, + 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5c}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 557 + {SEC_OID_SHA224, + 557, + {0x30, 0x3e, 0x02, 0x1d, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, + 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, + 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, + 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78, 0xf7, 0xdf, + 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef, 0x32, 0xb2, + 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5d}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 558 + {SEC_OID_SHA224, + 558, + {0x30, 0x3e, 0x02, 0x1d, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, + 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, + 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, + 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78, 0xf7, 0xdf, + 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef, 0x32, 0xb2, + 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5e}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 559 + {SEC_OID_SHA224, + 559, + {0x30, 0x3e, 0x02, 0x1d, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, + 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, + 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, + 0x02, 0x1d, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, + 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, + 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 560 + {SEC_OID_SHA224, + 560, + {0x30, 0x82, 0x01, 0x24, 0x02, 0x1d, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, + 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, + 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, + 0x82, 0x01, 0x01, 0x00, 0x8f, 0x79, 0x35, 0xd9, 0xb9, 0xaa, 0xe9, 0xbf, + 0xab, 0xed, 0x88, 0x7a, 0xcf, 0x49, 0x51, 0xb6, 0xf3, 0x2e, 0xc5, 0x9e, + 0x3b, 0xaf, 0x37, 0x18, 0xe8, 0xea, 0xc4, 0x96, 0x1f, 0x3e, 0xfd, 0x36, + 0x06, 0xe7, 0x43, 0x51, 0xa9, 0xc4, 0x18, 0x33, 0x39, 0xb8, 0x09, 0xe7, + 0xc2, 0xae, 0x1c, 0x53, 0x9b, 0xa7, 0x47, 0x5b, 0x85, 0xd0, 0x11, 0xad, + 0xb8, 0xb4, 0x79, 0x87, 0x75, 0x49, 0x84, 0x69, 0x5c, 0xac, 0x0e, 0x8f, + 0x14, 0xb3, 0x36, 0x08, 0x28, 0xa2, 0x2f, 0xfa, 0x27, 0x11, 0x0a, 0x3d, + 0x62, 0xa9, 0x93, 0x45, 0x34, 0x09, 0xa0, 0xfe, 0x69, 0x6c, 0x46, 0x58, + 0xf8, 0x4b, 0xdd, 0x20, 0x81, 0x9c, 0x37, 0x09, 0xa0, 0x10, 0x57, 0xb1, + 0x95, 0xad, 0xcd, 0x00, 0x23, 0x3d, 0xba, 0x54, 0x84, 0xb6, 0x29, 0x1f, + 0x9d, 0x64, 0x8e, 0xf8, 0x83, 0x44, 0x86, 0x77, 0x97, 0x9c, 0xec, 0x04, + 0xb4, 0x34, 0xa6, 0xac, 0x2e, 0x75, 0xe9, 0x98, 0x5d, 0xe2, 0x3d, 0xb0, + 0x29, 0x2f, 0xc1, 0x11, 0x8c, 0x9f, 0xfa, 0x9d, 0x81, 0x81, 0xe7, 0x33, + 0x8d, 0xb7, 0x92, 0xb7, 0x30, 0xd7, 0xb9, 0xe3, 0x49, 0x59, 0x2f, 0x68, + 0x09, 0x98, 0x72, 0x15, 0x39, 0x15, 0xea, 0x3d, 0x6b, 0x8b, 0x46, 0x53, + 0xc6, 0x33, 0x45, 0x8f, 0x80, 0x3b, 0x32, 0xa4, 0xc2, 0xe0, 0xf2, 0x72, + 0x90, 0x25, 0x6e, 0x4e, 0x3f, 0x8a, 0x3b, 0x08, 0x38, 0xa1, 0xc4, 0x50, + 0xe4, 0xe1, 0x8c, 0x1a, 0x29, 0xa3, 0x7d, 0xdf, 0x5e, 0xa1, 0x43, 0xde, + 0x4b, 0x66, 0xff, 0x04, 0x90, 0x3e, 0xd5, 0xcf, 0x16, 0x23, 0xe1, 0x58, + 0xd4, 0x87, 0xc6, 0x08, 0xe9, 0x7f, 0x21, 0x1c, 0xd8, 0x1d, 0xca, 0x23, + 0xcb, 0x6e, 0x38, 0x07, 0x65, 0xf8, 0x22, 0xe3, 0x42, 0xbe, 0x48, 0x4c, + 0x05, 0x76, 0x39, 0x39, 0x60, 0x1c, 0xd6, 0x67}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 561 + {SEC_OID_SHA224, + 561, + {0x30, 0x24, 0x02, 0x1d, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, + 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, + 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, + 0x00, 0x00, 0x00, 0x09, 0x03, 0x80, 0xfe, 0x01}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 562 + {SEC_OID_SHA224, + 562, + {0x30, 0x22, 0x02, 0x1d, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, + 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, + 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x09, 0x01, 0x42}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 563 + {SEC_OID_SHA224, + 563, + {0x30, 0x82, 0x01, 0x24, 0x02, 0x82, 0x01, 0x01, 0x00, 0x8f, 0x79, 0x35, + 0xd9, 0xb9, 0xaa, 0xe9, 0xbf, 0xab, 0xed, 0x88, 0x7a, 0xcf, 0x49, 0x51, + 0xb6, 0xf3, 0x2e, 0xc5, 0x9e, 0x3b, 0xaf, 0x37, 0x18, 0xe8, 0xea, 0xc4, + 0x96, 0x1f, 0x3e, 0xfd, 0x36, 0x06, 0xe7, 0x43, 0x51, 0xa9, 0xc4, 0x18, + 0x33, 0x39, 0xb8, 0x09, 0xe7, 0xc2, 0xae, 0x1c, 0x53, 0x9b, 0xa7, 0x47, + 0x5b, 0x85, 0xd0, 0x11, 0xad, 0xb8, 0xb4, 0x79, 0x87, 0x75, 0x49, 0x84, + 0x69, 0x5c, 0xac, 0x0e, 0x8f, 0x14, 0xb3, 0x36, 0x08, 0x28, 0xa2, 0x2f, + 0xfa, 0x27, 0x11, 0x0a, 0x3d, 0x62, 0xa9, 0x93, 0x45, 0x34, 0x09, 0xa0, + 0xfe, 0x69, 0x6c, 0x46, 0x58, 0xf8, 0x4b, 0xdd, 0x20, 0x81, 0x9c, 0x37, + 0x09, 0xa0, 0x10, 0x57, 0xb1, 0x95, 0xad, 0xcd, 0x00, 0x23, 0x3d, 0xba, + 0x54, 0x84, 0xb6, 0x29, 0x1f, 0x9d, 0x64, 0x8e, 0xf8, 0x83, 0x44, 0x86, + 0x77, 0x97, 0x9c, 0xec, 0x04, 0xb4, 0x34, 0xa6, 0xac, 0x2e, 0x75, 0xe9, + 0x98, 0x5d, 0xe2, 0x3d, 0xb0, 0x29, 0x2f, 0xc1, 0x11, 0x8c, 0x9f, 0xfa, + 0x9d, 0x81, 0x81, 0xe7, 0x33, 0x8d, 0xb7, 0x92, 0xb7, 0x30, 0xd7, 0xb9, + 0xe3, 0x49, 0x59, 0x2f, 0x68, 0x09, 0x98, 0x72, 0x15, 0x39, 0x15, 0xea, + 0x3d, 0x6b, 0x8b, 0x46, 0x53, 0xc6, 0x33, 0x45, 0x8f, 0x80, 0x3b, 0x32, + 0xa4, 0xc2, 0xe0, 0xf2, 0x72, 0x90, 0x25, 0x6e, 0x4e, 0x3f, 0x8a, 0x3b, + 0x08, 0x38, 0xa1, 0xc4, 0x50, 0xe4, 0xe1, 0x8c, 0x1a, 0x29, 0xa3, 0x7d, + 0xdf, 0x5e, 0xa1, 0x43, 0xde, 0x4b, 0x66, 0xff, 0x04, 0x90, 0x3e, 0xd5, + 0xcf, 0x16, 0x23, 0xe1, 0x58, 0xd4, 0x87, 0xc6, 0x08, 0xe9, 0x7f, 0x21, + 0x1c, 0xd8, 0x1d, 0xca, 0x23, 0xcb, 0x6e, 0x38, 0x07, 0x65, 0xf8, 0x22, + 0xe3, 0x42, 0xbe, 0x48, 0x4c, 0x05, 0x76, 0x39, 0x39, 0x60, 0x1c, 0xd6, + 0x67, 0x02, 0x1d, 0xff, 0x45, 0x09, 0x69, 0x59, 0x7a, 0x87, 0x08, 0x20, + 0x21, 0x18, 0x05, 0x98, 0x36, 0x88, 0x38, 0x7a, 0x10, 0xcd, 0x4d, 0xcc, + 0x45, 0x1a, 0x7f, 0x3f, 0x43, 0x2a, 0x96, 0xa3}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 564 + {SEC_OID_SHA224, + 564, + {0x30, 0x82, 0x01, 0x08, 0x02, 0x82, 0x01, 0x01, 0x00, 0x8f, 0x79, 0x35, + 0xd9, 0xb9, 0xaa, 0xe9, 0xbf, 0xab, 0xed, 0x88, 0x7a, 0xcf, 0x49, 0x51, + 0xb6, 0xf3, 0x2e, 0xc5, 0x9e, 0x3b, 0xaf, 0x37, 0x18, 0xe8, 0xea, 0xc4, + 0x96, 0x1f, 0x3e, 0xfd, 0x36, 0x06, 0xe7, 0x43, 0x51, 0xa9, 0xc4, 0x18, + 0x33, 0x39, 0xb8, 0x09, 0xe7, 0xc2, 0xae, 0x1c, 0x53, 0x9b, 0xa7, 0x47, + 0x5b, 0x85, 0xd0, 0x11, 0xad, 0xb8, 0xb4, 0x79, 0x87, 0x75, 0x49, 0x84, + 0x69, 0x5c, 0xac, 0x0e, 0x8f, 0x14, 0xb3, 0x36, 0x08, 0x28, 0xa2, 0x2f, + 0xfa, 0x27, 0x11, 0x0a, 0x3d, 0x62, 0xa9, 0x93, 0x45, 0x34, 0x09, 0xa0, + 0xfe, 0x69, 0x6c, 0x46, 0x58, 0xf8, 0x4b, 0xdd, 0x20, 0x81, 0x9c, 0x37, + 0x09, 0xa0, 0x10, 0x57, 0xb1, 0x95, 0xad, 0xcd, 0x00, 0x23, 0x3d, 0xba, + 0x54, 0x84, 0xb6, 0x29, 0x1f, 0x9d, 0x64, 0x8e, 0xf8, 0x83, 0x44, 0x86, + 0x77, 0x97, 0x9c, 0xec, 0x04, 0xb4, 0x34, 0xa6, 0xac, 0x2e, 0x75, 0xe9, + 0x98, 0x5d, 0xe2, 0x3d, 0xb0, 0x29, 0x2f, 0xc1, 0x11, 0x8c, 0x9f, 0xfa, + 0x9d, 0x81, 0x81, 0xe7, 0x33, 0x8d, 0xb7, 0x92, 0xb7, 0x30, 0xd7, 0xb9, + 0xe3, 0x49, 0x59, 0x2f, 0x68, 0x09, 0x98, 0x72, 0x15, 0x39, 0x15, 0xea, + 0x3d, 0x6b, 0x8b, 0x46, 0x53, 0xc6, 0x33, 0x45, 0x8f, 0x80, 0x3b, 0x32, + 0xa4, 0xc2, 0xe0, 0xf2, 0x72, 0x90, 0x25, 0x6e, 0x4e, 0x3f, 0x8a, 0x3b, + 0x08, 0x38, 0xa1, 0xc4, 0x50, 0xe4, 0xe1, 0x8c, 0x1a, 0x29, 0xa3, 0x7d, + 0xdf, 0x5e, 0xa1, 0x43, 0xde, 0x4b, 0x66, 0xff, 0x04, 0x90, 0x3e, 0xd5, + 0xcf, 0x16, 0x23, 0xe1, 0x58, 0xd4, 0x87, 0xc6, 0x08, 0xe9, 0x7f, 0x21, + 0x1c, 0xd8, 0x1d, 0xca, 0x23, 0xcb, 0x6e, 0x38, 0x07, 0x65, 0xf8, 0x22, + 0xe3, 0x42, 0xbe, 0x48, 0x4c, 0x05, 0x76, 0x39, 0x39, 0x60, 0x1c, 0xd6, + 0x67, 0x02, 0x01, 0x00}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 565 + {SEC_OID_SHA224, + 565, + {0x30, 0x82, 0x01, 0x08, 0x02, 0x82, 0x01, 0x01, 0x00, 0x8f, 0x79, 0x35, + 0xd9, 0xb9, 0xaa, 0xe9, 0xbf, 0xab, 0xed, 0x88, 0x7a, 0xcf, 0x49, 0x51, + 0xb6, 0xf3, 0x2e, 0xc5, 0x9e, 0x3b, 0xaf, 0x37, 0x18, 0xe8, 0xea, 0xc4, + 0x96, 0x1f, 0x3e, 0xfd, 0x36, 0x06, 0xe7, 0x43, 0x51, 0xa9, 0xc4, 0x18, + 0x33, 0x39, 0xb8, 0x09, 0xe7, 0xc2, 0xae, 0x1c, 0x53, 0x9b, 0xa7, 0x47, + 0x5b, 0x85, 0xd0, 0x11, 0xad, 0xb8, 0xb4, 0x79, 0x87, 0x75, 0x49, 0x84, + 0x69, 0x5c, 0xac, 0x0e, 0x8f, 0x14, 0xb3, 0x36, 0x08, 0x28, 0xa2, 0x2f, + 0xfa, 0x27, 0x11, 0x0a, 0x3d, 0x62, 0xa9, 0x93, 0x45, 0x34, 0x09, 0xa0, + 0xfe, 0x69, 0x6c, 0x46, 0x58, 0xf8, 0x4b, 0xdd, 0x20, 0x81, 0x9c, 0x37, + 0x09, 0xa0, 0x10, 0x57, 0xb1, 0x95, 0xad, 0xcd, 0x00, 0x23, 0x3d, 0xba, + 0x54, 0x84, 0xb6, 0x29, 0x1f, 0x9d, 0x64, 0x8e, 0xf8, 0x83, 0x44, 0x86, + 0x77, 0x97, 0x9c, 0xec, 0x04, 0xb4, 0x34, 0xa6, 0xac, 0x2e, 0x75, 0xe9, + 0x98, 0x5d, 0xe2, 0x3d, 0xb0, 0x29, 0x2f, 0xc1, 0x11, 0x8c, 0x9f, 0xfa, + 0x9d, 0x81, 0x81, 0xe7, 0x33, 0x8d, 0xb7, 0x92, 0xb7, 0x30, 0xd7, 0xb9, + 0xe3, 0x49, 0x59, 0x2f, 0x68, 0x09, 0x98, 0x72, 0x15, 0x39, 0x15, 0xea, + 0x3d, 0x6b, 0x8b, 0x46, 0x53, 0xc6, 0x33, 0x45, 0x8f, 0x80, 0x3b, 0x32, + 0xa4, 0xc2, 0xe0, 0xf2, 0x72, 0x90, 0x25, 0x6e, 0x4e, 0x3f, 0x8a, 0x3b, + 0x08, 0x38, 0xa1, 0xc4, 0x50, 0xe4, 0xe1, 0x8c, 0x1a, 0x29, 0xa3, 0x7d, + 0xdf, 0x5e, 0xa1, 0x43, 0xde, 0x4b, 0x66, 0xff, 0x04, 0x90, 0x3e, 0xd5, + 0xcf, 0x16, 0x23, 0xe1, 0x58, 0xd4, 0x87, 0xc6, 0x08, 0xe9, 0x7f, 0x21, + 0x1c, 0xd8, 0x1d, 0xca, 0x23, 0xcb, 0x6e, 0x38, 0x07, 0x65, 0xf8, 0x22, + 0xe3, 0x42, 0xbe, 0x48, 0x4c, 0x05, 0x76, 0x39, 0x39, 0x60, 0x1c, 0xd6, + 0x67, 0x02, 0x01, 0x01}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 566 + {SEC_OID_SHA224, + 566, + {0x30, 0x82, 0x01, 0x08, 0x02, 0x82, 0x01, 0x01, 0x00, 0x8f, 0x79, 0x35, + 0xd9, 0xb9, 0xaa, 0xe9, 0xbf, 0xab, 0xed, 0x88, 0x7a, 0xcf, 0x49, 0x51, + 0xb6, 0xf3, 0x2e, 0xc5, 0x9e, 0x3b, 0xaf, 0x37, 0x18, 0xe8, 0xea, 0xc4, + 0x96, 0x1f, 0x3e, 0xfd, 0x36, 0x06, 0xe7, 0x43, 0x51, 0xa9, 0xc4, 0x18, + 0x33, 0x39, 0xb8, 0x09, 0xe7, 0xc2, 0xae, 0x1c, 0x53, 0x9b, 0xa7, 0x47, + 0x5b, 0x85, 0xd0, 0x11, 0xad, 0xb8, 0xb4, 0x79, 0x87, 0x75, 0x49, 0x84, + 0x69, 0x5c, 0xac, 0x0e, 0x8f, 0x14, 0xb3, 0x36, 0x08, 0x28, 0xa2, 0x2f, + 0xfa, 0x27, 0x11, 0x0a, 0x3d, 0x62, 0xa9, 0x93, 0x45, 0x34, 0x09, 0xa0, + 0xfe, 0x69, 0x6c, 0x46, 0x58, 0xf8, 0x4b, 0xdd, 0x20, 0x81, 0x9c, 0x37, + 0x09, 0xa0, 0x10, 0x57, 0xb1, 0x95, 0xad, 0xcd, 0x00, 0x23, 0x3d, 0xba, + 0x54, 0x84, 0xb6, 0x29, 0x1f, 0x9d, 0x64, 0x8e, 0xf8, 0x83, 0x44, 0x86, + 0x77, 0x97, 0x9c, 0xec, 0x04, 0xb4, 0x34, 0xa6, 0xac, 0x2e, 0x75, 0xe9, + 0x98, 0x5d, 0xe2, 0x3d, 0xb0, 0x29, 0x2f, 0xc1, 0x11, 0x8c, 0x9f, 0xfa, + 0x9d, 0x81, 0x81, 0xe7, 0x33, 0x8d, 0xb7, 0x92, 0xb7, 0x30, 0xd7, 0xb9, + 0xe3, 0x49, 0x59, 0x2f, 0x68, 0x09, 0x98, 0x72, 0x15, 0x39, 0x15, 0xea, + 0x3d, 0x6b, 0x8b, 0x46, 0x53, 0xc6, 0x33, 0x45, 0x8f, 0x80, 0x3b, 0x32, + 0xa4, 0xc2, 0xe0, 0xf2, 0x72, 0x90, 0x25, 0x6e, 0x4e, 0x3f, 0x8a, 0x3b, + 0x08, 0x38, 0xa1, 0xc4, 0x50, 0xe4, 0xe1, 0x8c, 0x1a, 0x29, 0xa3, 0x7d, + 0xdf, 0x5e, 0xa1, 0x43, 0xde, 0x4b, 0x66, 0xff, 0x04, 0x90, 0x3e, 0xd5, + 0xcf, 0x16, 0x23, 0xe1, 0x58, 0xd4, 0x87, 0xc6, 0x08, 0xe9, 0x7f, 0x21, + 0x1c, 0xd8, 0x1d, 0xca, 0x23, 0xcb, 0x6e, 0x38, 0x07, 0x65, 0xf8, 0x22, + 0xe3, 0x42, 0xbe, 0x48, 0x4c, 0x05, 0x76, 0x39, 0x39, 0x60, 0x1c, 0xd6, + 0x67, 0x02, 0x01, 0xff}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 567 + {SEC_OID_SHA224, + 567, + {0x30, 0x82, 0x01, 0x23, 0x02, 0x82, 0x01, 0x01, 0x00, 0x8f, 0x79, 0x35, + 0xd9, 0xb9, 0xaa, 0xe9, 0xbf, 0xab, 0xed, 0x88, 0x7a, 0xcf, 0x49, 0x51, + 0xb6, 0xf3, 0x2e, 0xc5, 0x9e, 0x3b, 0xaf, 0x37, 0x18, 0xe8, 0xea, 0xc4, + 0x96, 0x1f, 0x3e, 0xfd, 0x36, 0x06, 0xe7, 0x43, 0x51, 0xa9, 0xc4, 0x18, + 0x33, 0x39, 0xb8, 0x09, 0xe7, 0xc2, 0xae, 0x1c, 0x53, 0x9b, 0xa7, 0x47, + 0x5b, 0x85, 0xd0, 0x11, 0xad, 0xb8, 0xb4, 0x79, 0x87, 0x75, 0x49, 0x84, + 0x69, 0x5c, 0xac, 0x0e, 0x8f, 0x14, 0xb3, 0x36, 0x08, 0x28, 0xa2, 0x2f, + 0xfa, 0x27, 0x11, 0x0a, 0x3d, 0x62, 0xa9, 0x93, 0x45, 0x34, 0x09, 0xa0, + 0xfe, 0x69, 0x6c, 0x46, 0x58, 0xf8, 0x4b, 0xdd, 0x20, 0x81, 0x9c, 0x37, + 0x09, 0xa0, 0x10, 0x57, 0xb1, 0x95, 0xad, 0xcd, 0x00, 0x23, 0x3d, 0xba, + 0x54, 0x84, 0xb6, 0x29, 0x1f, 0x9d, 0x64, 0x8e, 0xf8, 0x83, 0x44, 0x86, + 0x77, 0x97, 0x9c, 0xec, 0x04, 0xb4, 0x34, 0xa6, 0xac, 0x2e, 0x75, 0xe9, + 0x98, 0x5d, 0xe2, 0x3d, 0xb0, 0x29, 0x2f, 0xc1, 0x11, 0x8c, 0x9f, 0xfa, + 0x9d, 0x81, 0x81, 0xe7, 0x33, 0x8d, 0xb7, 0x92, 0xb7, 0x30, 0xd7, 0xb9, + 0xe3, 0x49, 0x59, 0x2f, 0x68, 0x09, 0x98, 0x72, 0x15, 0x39, 0x15, 0xea, + 0x3d, 0x6b, 0x8b, 0x46, 0x53, 0xc6, 0x33, 0x45, 0x8f, 0x80, 0x3b, 0x32, + 0xa4, 0xc2, 0xe0, 0xf2, 0x72, 0x90, 0x25, 0x6e, 0x4e, 0x3f, 0x8a, 0x3b, + 0x08, 0x38, 0xa1, 0xc4, 0x50, 0xe4, 0xe1, 0x8c, 0x1a, 0x29, 0xa3, 0x7d, + 0xdf, 0x5e, 0xa1, 0x43, 0xde, 0x4b, 0x66, 0xff, 0x04, 0x90, 0x3e, 0xd5, + 0xcf, 0x16, 0x23, 0xe1, 0x58, 0xd4, 0x87, 0xc6, 0x08, 0xe9, 0x7f, 0x21, + 0x1c, 0xd8, 0x1d, 0xca, 0x23, 0xcb, 0x6e, 0x38, 0x07, 0x65, 0xf8, 0x22, + 0xe3, 0x42, 0xbe, 0x48, 0x4c, 0x05, 0x76, 0x39, 0x39, 0x60, 0x1c, 0xd6, + 0x67, 0x02, 0x1c, 0x5d, 0x7b, 0x4b, 0x53, 0x42, 0xbc, 0x7b, 0xef, 0xef, + 0x73, 0xfd, 0x33, 0xe4, 0xbb, 0xe3, 0xc2, 0xf7, 0x99, 0x59, 0x19, 0xdd, + 0x72, 0xc0, 0x60, 0x5e, 0x6a, 0xb4, 0xae}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 568 + {SEC_OID_SHA224, + 568, + {0x30, 0x82, 0x01, 0x23, 0x02, 0x82, 0x01, 0x01, 0x00, 0x8f, 0x79, 0x35, + 0xd9, 0xb9, 0xaa, 0xe9, 0xbf, 0xab, 0xed, 0x88, 0x7a, 0xcf, 0x49, 0x51, + 0xb6, 0xf3, 0x2e, 0xc5, 0x9e, 0x3b, 0xaf, 0x37, 0x18, 0xe8, 0xea, 0xc4, + 0x96, 0x1f, 0x3e, 0xfd, 0x36, 0x06, 0xe7, 0x43, 0x51, 0xa9, 0xc4, 0x18, + 0x33, 0x39, 0xb8, 0x09, 0xe7, 0xc2, 0xae, 0x1c, 0x53, 0x9b, 0xa7, 0x47, + 0x5b, 0x85, 0xd0, 0x11, 0xad, 0xb8, 0xb4, 0x79, 0x87, 0x75, 0x49, 0x84, + 0x69, 0x5c, 0xac, 0x0e, 0x8f, 0x14, 0xb3, 0x36, 0x08, 0x28, 0xa2, 0x2f, + 0xfa, 0x27, 0x11, 0x0a, 0x3d, 0x62, 0xa9, 0x93, 0x45, 0x34, 0x09, 0xa0, + 0xfe, 0x69, 0x6c, 0x46, 0x58, 0xf8, 0x4b, 0xdd, 0x20, 0x81, 0x9c, 0x37, + 0x09, 0xa0, 0x10, 0x57, 0xb1, 0x95, 0xad, 0xcd, 0x00, 0x23, 0x3d, 0xba, + 0x54, 0x84, 0xb6, 0x29, 0x1f, 0x9d, 0x64, 0x8e, 0xf8, 0x83, 0x44, 0x86, + 0x77, 0x97, 0x9c, 0xec, 0x04, 0xb4, 0x34, 0xa6, 0xac, 0x2e, 0x75, 0xe9, + 0x98, 0x5d, 0xe2, 0x3d, 0xb0, 0x29, 0x2f, 0xc1, 0x11, 0x8c, 0x9f, 0xfa, + 0x9d, 0x81, 0x81, 0xe7, 0x33, 0x8d, 0xb7, 0x92, 0xb7, 0x30, 0xd7, 0xb9, + 0xe3, 0x49, 0x59, 0x2f, 0x68, 0x09, 0x98, 0x72, 0x15, 0x39, 0x15, 0xea, + 0x3d, 0x6b, 0x8b, 0x46, 0x53, 0xc6, 0x33, 0x45, 0x8f, 0x80, 0x3b, 0x32, + 0xa4, 0xc2, 0xe0, 0xf2, 0x72, 0x90, 0x25, 0x6e, 0x4e, 0x3f, 0x8a, 0x3b, + 0x08, 0x38, 0xa1, 0xc4, 0x50, 0xe4, 0xe1, 0x8c, 0x1a, 0x29, 0xa3, 0x7d, + 0xdf, 0x5e, 0xa1, 0x43, 0xde, 0x4b, 0x66, 0xff, 0x04, 0x90, 0x3e, 0xd5, + 0xcf, 0x16, 0x23, 0xe1, 0x58, 0xd4, 0x87, 0xc6, 0x08, 0xe9, 0x7f, 0x21, + 0x1c, 0xd8, 0x1d, 0xca, 0x23, 0xcb, 0x6e, 0x38, 0x07, 0x65, 0xf8, 0x22, + 0xe3, 0x42, 0xbe, 0x48, 0x4c, 0x05, 0x76, 0x39, 0x39, 0x60, 0x1c, 0xd6, + 0x67, 0x02, 0x1c, 0x5d, 0x7b, 0x4b, 0x53, 0x42, 0xbc, 0x7b, 0xef, 0xef, + 0x73, 0xfd, 0x33, 0xe4, 0xbb, 0xe3, 0xc2, 0xf7, 0x99, 0x59, 0x19, 0xdd, + 0x72, 0xc0, 0x60, 0x5e, 0x6a, 0xb4, 0xaf}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 569 + {SEC_OID_SHA224, + 569, + {0x30, 0x82, 0x01, 0x24, 0x02, 0x82, 0x01, 0x01, 0x00, 0x8f, 0x79, 0x35, + 0xd9, 0xb9, 0xaa, 0xe9, 0xbf, 0xab, 0xed, 0x88, 0x7a, 0xcf, 0x49, 0x51, + 0xb6, 0xf3, 0x2e, 0xc5, 0x9e, 0x3b, 0xaf, 0x37, 0x18, 0xe8, 0xea, 0xc4, + 0x96, 0x1f, 0x3e, 0xfd, 0x36, 0x06, 0xe7, 0x43, 0x51, 0xa9, 0xc4, 0x18, + 0x33, 0x39, 0xb8, 0x09, 0xe7, 0xc2, 0xae, 0x1c, 0x53, 0x9b, 0xa7, 0x47, + 0x5b, 0x85, 0xd0, 0x11, 0xad, 0xb8, 0xb4, 0x79, 0x87, 0x75, 0x49, 0x84, + 0x69, 0x5c, 0xac, 0x0e, 0x8f, 0x14, 0xb3, 0x36, 0x08, 0x28, 0xa2, 0x2f, + 0xfa, 0x27, 0x11, 0x0a, 0x3d, 0x62, 0xa9, 0x93, 0x45, 0x34, 0x09, 0xa0, + 0xfe, 0x69, 0x6c, 0x46, 0x58, 0xf8, 0x4b, 0xdd, 0x20, 0x81, 0x9c, 0x37, + 0x09, 0xa0, 0x10, 0x57, 0xb1, 0x95, 0xad, 0xcd, 0x00, 0x23, 0x3d, 0xba, + 0x54, 0x84, 0xb6, 0x29, 0x1f, 0x9d, 0x64, 0x8e, 0xf8, 0x83, 0x44, 0x86, + 0x77, 0x97, 0x9c, 0xec, 0x04, 0xb4, 0x34, 0xa6, 0xac, 0x2e, 0x75, 0xe9, + 0x98, 0x5d, 0xe2, 0x3d, 0xb0, 0x29, 0x2f, 0xc1, 0x11, 0x8c, 0x9f, 0xfa, + 0x9d, 0x81, 0x81, 0xe7, 0x33, 0x8d, 0xb7, 0x92, 0xb7, 0x30, 0xd7, 0xb9, + 0xe3, 0x49, 0x59, 0x2f, 0x68, 0x09, 0x98, 0x72, 0x15, 0x39, 0x15, 0xea, + 0x3d, 0x6b, 0x8b, 0x46, 0x53, 0xc6, 0x33, 0x45, 0x8f, 0x80, 0x3b, 0x32, + 0xa4, 0xc2, 0xe0, 0xf2, 0x72, 0x90, 0x25, 0x6e, 0x4e, 0x3f, 0x8a, 0x3b, + 0x08, 0x38, 0xa1, 0xc4, 0x50, 0xe4, 0xe1, 0x8c, 0x1a, 0x29, 0xa3, 0x7d, + 0xdf, 0x5e, 0xa1, 0x43, 0xde, 0x4b, 0x66, 0xff, 0x04, 0x90, 0x3e, 0xd5, + 0xcf, 0x16, 0x23, 0xe1, 0x58, 0xd4, 0x87, 0xc6, 0x08, 0xe9, 0x7f, 0x21, + 0x1c, 0xd8, 0x1d, 0xca, 0x23, 0xcb, 0x6e, 0x38, 0x07, 0x65, 0xf8, 0x22, + 0xe3, 0x42, 0xbe, 0x48, 0x4c, 0x05, 0x76, 0x39, 0x39, 0x60, 0x1c, 0xd6, + 0x67, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78, 0xf7, 0xdf, + 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef, 0x32, 0xb2, 0x33, + 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5c}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 570 + {SEC_OID_SHA224, + 570, + {0x30, 0x82, 0x01, 0x24, 0x02, 0x82, 0x01, 0x01, 0x00, 0x8f, 0x79, 0x35, + 0xd9, 0xb9, 0xaa, 0xe9, 0xbf, 0xab, 0xed, 0x88, 0x7a, 0xcf, 0x49, 0x51, + 0xb6, 0xf3, 0x2e, 0xc5, 0x9e, 0x3b, 0xaf, 0x37, 0x18, 0xe8, 0xea, 0xc4, + 0x96, 0x1f, 0x3e, 0xfd, 0x36, 0x06, 0xe7, 0x43, 0x51, 0xa9, 0xc4, 0x18, + 0x33, 0x39, 0xb8, 0x09, 0xe7, 0xc2, 0xae, 0x1c, 0x53, 0x9b, 0xa7, 0x47, + 0x5b, 0x85, 0xd0, 0x11, 0xad, 0xb8, 0xb4, 0x79, 0x87, 0x75, 0x49, 0x84, + 0x69, 0x5c, 0xac, 0x0e, 0x8f, 0x14, 0xb3, 0x36, 0x08, 0x28, 0xa2, 0x2f, + 0xfa, 0x27, 0x11, 0x0a, 0x3d, 0x62, 0xa9, 0x93, 0x45, 0x34, 0x09, 0xa0, + 0xfe, 0x69, 0x6c, 0x46, 0x58, 0xf8, 0x4b, 0xdd, 0x20, 0x81, 0x9c, 0x37, + 0x09, 0xa0, 0x10, 0x57, 0xb1, 0x95, 0xad, 0xcd, 0x00, 0x23, 0x3d, 0xba, + 0x54, 0x84, 0xb6, 0x29, 0x1f, 0x9d, 0x64, 0x8e, 0xf8, 0x83, 0x44, 0x86, + 0x77, 0x97, 0x9c, 0xec, 0x04, 0xb4, 0x34, 0xa6, 0xac, 0x2e, 0x75, 0xe9, + 0x98, 0x5d, 0xe2, 0x3d, 0xb0, 0x29, 0x2f, 0xc1, 0x11, 0x8c, 0x9f, 0xfa, + 0x9d, 0x81, 0x81, 0xe7, 0x33, 0x8d, 0xb7, 0x92, 0xb7, 0x30, 0xd7, 0xb9, + 0xe3, 0x49, 0x59, 0x2f, 0x68, 0x09, 0x98, 0x72, 0x15, 0x39, 0x15, 0xea, + 0x3d, 0x6b, 0x8b, 0x46, 0x53, 0xc6, 0x33, 0x45, 0x8f, 0x80, 0x3b, 0x32, + 0xa4, 0xc2, 0xe0, 0xf2, 0x72, 0x90, 0x25, 0x6e, 0x4e, 0x3f, 0x8a, 0x3b, + 0x08, 0x38, 0xa1, 0xc4, 0x50, 0xe4, 0xe1, 0x8c, 0x1a, 0x29, 0xa3, 0x7d, + 0xdf, 0x5e, 0xa1, 0x43, 0xde, 0x4b, 0x66, 0xff, 0x04, 0x90, 0x3e, 0xd5, + 0xcf, 0x16, 0x23, 0xe1, 0x58, 0xd4, 0x87, 0xc6, 0x08, 0xe9, 0x7f, 0x21, + 0x1c, 0xd8, 0x1d, 0xca, 0x23, 0xcb, 0x6e, 0x38, 0x07, 0x65, 0xf8, 0x22, + 0xe3, 0x42, 0xbe, 0x48, 0x4c, 0x05, 0x76, 0x39, 0x39, 0x60, 0x1c, 0xd6, + 0x67, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78, 0xf7, 0xdf, + 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef, 0x32, 0xb2, 0x33, + 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5d}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 571 + {SEC_OID_SHA224, + 571, + {0x30, 0x82, 0x01, 0x24, 0x02, 0x82, 0x01, 0x01, 0x00, 0x8f, 0x79, 0x35, + 0xd9, 0xb9, 0xaa, 0xe9, 0xbf, 0xab, 0xed, 0x88, 0x7a, 0xcf, 0x49, 0x51, + 0xb6, 0xf3, 0x2e, 0xc5, 0x9e, 0x3b, 0xaf, 0x37, 0x18, 0xe8, 0xea, 0xc4, + 0x96, 0x1f, 0x3e, 0xfd, 0x36, 0x06, 0xe7, 0x43, 0x51, 0xa9, 0xc4, 0x18, + 0x33, 0x39, 0xb8, 0x09, 0xe7, 0xc2, 0xae, 0x1c, 0x53, 0x9b, 0xa7, 0x47, + 0x5b, 0x85, 0xd0, 0x11, 0xad, 0xb8, 0xb4, 0x79, 0x87, 0x75, 0x49, 0x84, + 0x69, 0x5c, 0xac, 0x0e, 0x8f, 0x14, 0xb3, 0x36, 0x08, 0x28, 0xa2, 0x2f, + 0xfa, 0x27, 0x11, 0x0a, 0x3d, 0x62, 0xa9, 0x93, 0x45, 0x34, 0x09, 0xa0, + 0xfe, 0x69, 0x6c, 0x46, 0x58, 0xf8, 0x4b, 0xdd, 0x20, 0x81, 0x9c, 0x37, + 0x09, 0xa0, 0x10, 0x57, 0xb1, 0x95, 0xad, 0xcd, 0x00, 0x23, 0x3d, 0xba, + 0x54, 0x84, 0xb6, 0x29, 0x1f, 0x9d, 0x64, 0x8e, 0xf8, 0x83, 0x44, 0x86, + 0x77, 0x97, 0x9c, 0xec, 0x04, 0xb4, 0x34, 0xa6, 0xac, 0x2e, 0x75, 0xe9, + 0x98, 0x5d, 0xe2, 0x3d, 0xb0, 0x29, 0x2f, 0xc1, 0x11, 0x8c, 0x9f, 0xfa, + 0x9d, 0x81, 0x81, 0xe7, 0x33, 0x8d, 0xb7, 0x92, 0xb7, 0x30, 0xd7, 0xb9, + 0xe3, 0x49, 0x59, 0x2f, 0x68, 0x09, 0x98, 0x72, 0x15, 0x39, 0x15, 0xea, + 0x3d, 0x6b, 0x8b, 0x46, 0x53, 0xc6, 0x33, 0x45, 0x8f, 0x80, 0x3b, 0x32, + 0xa4, 0xc2, 0xe0, 0xf2, 0x72, 0x90, 0x25, 0x6e, 0x4e, 0x3f, 0x8a, 0x3b, + 0x08, 0x38, 0xa1, 0xc4, 0x50, 0xe4, 0xe1, 0x8c, 0x1a, 0x29, 0xa3, 0x7d, + 0xdf, 0x5e, 0xa1, 0x43, 0xde, 0x4b, 0x66, 0xff, 0x04, 0x90, 0x3e, 0xd5, + 0xcf, 0x16, 0x23, 0xe1, 0x58, 0xd4, 0x87, 0xc6, 0x08, 0xe9, 0x7f, 0x21, + 0x1c, 0xd8, 0x1d, 0xca, 0x23, 0xcb, 0x6e, 0x38, 0x07, 0x65, 0xf8, 0x22, + 0xe3, 0x42, 0xbe, 0x48, 0x4c, 0x05, 0x76, 0x39, 0x39, 0x60, 0x1c, 0xd6, + 0x67, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78, 0xf7, 0xdf, + 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef, 0x32, 0xb2, 0x33, + 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5e}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 572 + {SEC_OID_SHA224, + 572, + {0x30, 0x82, 0x01, 0x24, 0x02, 0x82, 0x01, 0x01, 0x00, 0x8f, 0x79, 0x35, + 0xd9, 0xb9, 0xaa, 0xe9, 0xbf, 0xab, 0xed, 0x88, 0x7a, 0xcf, 0x49, 0x51, + 0xb6, 0xf3, 0x2e, 0xc5, 0x9e, 0x3b, 0xaf, 0x37, 0x18, 0xe8, 0xea, 0xc4, + 0x96, 0x1f, 0x3e, 0xfd, 0x36, 0x06, 0xe7, 0x43, 0x51, 0xa9, 0xc4, 0x18, + 0x33, 0x39, 0xb8, 0x09, 0xe7, 0xc2, 0xae, 0x1c, 0x53, 0x9b, 0xa7, 0x47, + 0x5b, 0x85, 0xd0, 0x11, 0xad, 0xb8, 0xb4, 0x79, 0x87, 0x75, 0x49, 0x84, + 0x69, 0x5c, 0xac, 0x0e, 0x8f, 0x14, 0xb3, 0x36, 0x08, 0x28, 0xa2, 0x2f, + 0xfa, 0x27, 0x11, 0x0a, 0x3d, 0x62, 0xa9, 0x93, 0x45, 0x34, 0x09, 0xa0, + 0xfe, 0x69, 0x6c, 0x46, 0x58, 0xf8, 0x4b, 0xdd, 0x20, 0x81, 0x9c, 0x37, + 0x09, 0xa0, 0x10, 0x57, 0xb1, 0x95, 0xad, 0xcd, 0x00, 0x23, 0x3d, 0xba, + 0x54, 0x84, 0xb6, 0x29, 0x1f, 0x9d, 0x64, 0x8e, 0xf8, 0x83, 0x44, 0x86, + 0x77, 0x97, 0x9c, 0xec, 0x04, 0xb4, 0x34, 0xa6, 0xac, 0x2e, 0x75, 0xe9, + 0x98, 0x5d, 0xe2, 0x3d, 0xb0, 0x29, 0x2f, 0xc1, 0x11, 0x8c, 0x9f, 0xfa, + 0x9d, 0x81, 0x81, 0xe7, 0x33, 0x8d, 0xb7, 0x92, 0xb7, 0x30, 0xd7, 0xb9, + 0xe3, 0x49, 0x59, 0x2f, 0x68, 0x09, 0x98, 0x72, 0x15, 0x39, 0x15, 0xea, + 0x3d, 0x6b, 0x8b, 0x46, 0x53, 0xc6, 0x33, 0x45, 0x8f, 0x80, 0x3b, 0x32, + 0xa4, 0xc2, 0xe0, 0xf2, 0x72, 0x90, 0x25, 0x6e, 0x4e, 0x3f, 0x8a, 0x3b, + 0x08, 0x38, 0xa1, 0xc4, 0x50, 0xe4, 0xe1, 0x8c, 0x1a, 0x29, 0xa3, 0x7d, + 0xdf, 0x5e, 0xa1, 0x43, 0xde, 0x4b, 0x66, 0xff, 0x04, 0x90, 0x3e, 0xd5, + 0xcf, 0x16, 0x23, 0xe1, 0x58, 0xd4, 0x87, 0xc6, 0x08, 0xe9, 0x7f, 0x21, + 0x1c, 0xd8, 0x1d, 0xca, 0x23, 0xcb, 0x6e, 0x38, 0x07, 0x65, 0xf8, 0x22, + 0xe3, 0x42, 0xbe, 0x48, 0x4c, 0x05, 0x76, 0x39, 0x39, 0x60, 0x1c, 0xd6, + 0x67, 0x02, 0x1d, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, + 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, + 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 573 + {SEC_OID_SHA224, + 573, + {0x30, 0x82, 0x02, 0x0a, 0x02, 0x82, 0x01, 0x01, 0x00, 0x8f, 0x79, 0x35, + 0xd9, 0xb9, 0xaa, 0xe9, 0xbf, 0xab, 0xed, 0x88, 0x7a, 0xcf, 0x49, 0x51, + 0xb6, 0xf3, 0x2e, 0xc5, 0x9e, 0x3b, 0xaf, 0x37, 0x18, 0xe8, 0xea, 0xc4, + 0x96, 0x1f, 0x3e, 0xfd, 0x36, 0x06, 0xe7, 0x43, 0x51, 0xa9, 0xc4, 0x18, + 0x33, 0x39, 0xb8, 0x09, 0xe7, 0xc2, 0xae, 0x1c, 0x53, 0x9b, 0xa7, 0x47, + 0x5b, 0x85, 0xd0, 0x11, 0xad, 0xb8, 0xb4, 0x79, 0x87, 0x75, 0x49, 0x84, + 0x69, 0x5c, 0xac, 0x0e, 0x8f, 0x14, 0xb3, 0x36, 0x08, 0x28, 0xa2, 0x2f, + 0xfa, 0x27, 0x11, 0x0a, 0x3d, 0x62, 0xa9, 0x93, 0x45, 0x34, 0x09, 0xa0, + 0xfe, 0x69, 0x6c, 0x46, 0x58, 0xf8, 0x4b, 0xdd, 0x20, 0x81, 0x9c, 0x37, + 0x09, 0xa0, 0x10, 0x57, 0xb1, 0x95, 0xad, 0xcd, 0x00, 0x23, 0x3d, 0xba, + 0x54, 0x84, 0xb6, 0x29, 0x1f, 0x9d, 0x64, 0x8e, 0xf8, 0x83, 0x44, 0x86, + 0x77, 0x97, 0x9c, 0xec, 0x04, 0xb4, 0x34, 0xa6, 0xac, 0x2e, 0x75, 0xe9, + 0x98, 0x5d, 0xe2, 0x3d, 0xb0, 0x29, 0x2f, 0xc1, 0x11, 0x8c, 0x9f, 0xfa, + 0x9d, 0x81, 0x81, 0xe7, 0x33, 0x8d, 0xb7, 0x92, 0xb7, 0x30, 0xd7, 0xb9, + 0xe3, 0x49, 0x59, 0x2f, 0x68, 0x09, 0x98, 0x72, 0x15, 0x39, 0x15, 0xea, + 0x3d, 0x6b, 0x8b, 0x46, 0x53, 0xc6, 0x33, 0x45, 0x8f, 0x80, 0x3b, 0x32, + 0xa4, 0xc2, 0xe0, 0xf2, 0x72, 0x90, 0x25, 0x6e, 0x4e, 0x3f, 0x8a, 0x3b, + 0x08, 0x38, 0xa1, 0xc4, 0x50, 0xe4, 0xe1, 0x8c, 0x1a, 0x29, 0xa3, 0x7d, + 0xdf, 0x5e, 0xa1, 0x43, 0xde, 0x4b, 0x66, 0xff, 0x04, 0x90, 0x3e, 0xd5, + 0xcf, 0x16, 0x23, 0xe1, 0x58, 0xd4, 0x87, 0xc6, 0x08, 0xe9, 0x7f, 0x21, + 0x1c, 0xd8, 0x1d, 0xca, 0x23, 0xcb, 0x6e, 0x38, 0x07, 0x65, 0xf8, 0x22, + 0xe3, 0x42, 0xbe, 0x48, 0x4c, 0x05, 0x76, 0x39, 0x39, 0x60, 0x1c, 0xd6, + 0x67, 0x02, 0x82, 0x01, 0x01, 0x00, 0x8f, 0x79, 0x35, 0xd9, 0xb9, 0xaa, + 0xe9, 0xbf, 0xab, 0xed, 0x88, 0x7a, 0xcf, 0x49, 0x51, 0xb6, 0xf3, 0x2e, + 0xc5, 0x9e, 0x3b, 0xaf, 0x37, 0x18, 0xe8, 0xea, 0xc4, 0x96, 0x1f, 0x3e, + 0xfd, 0x36, 0x06, 0xe7, 0x43, 0x51, 0xa9, 0xc4, 0x18, 0x33, 0x39, 0xb8, + 0x09, 0xe7, 0xc2, 0xae, 0x1c, 0x53, 0x9b, 0xa7, 0x47, 0x5b, 0x85, 0xd0, + 0x11, 0xad, 0xb8, 0xb4, 0x79, 0x87, 0x75, 0x49, 0x84, 0x69, 0x5c, 0xac, + 0x0e, 0x8f, 0x14, 0xb3, 0x36, 0x08, 0x28, 0xa2, 0x2f, 0xfa, 0x27, 0x11, + 0x0a, 0x3d, 0x62, 0xa9, 0x93, 0x45, 0x34, 0x09, 0xa0, 0xfe, 0x69, 0x6c, + 0x46, 0x58, 0xf8, 0x4b, 0xdd, 0x20, 0x81, 0x9c, 0x37, 0x09, 0xa0, 0x10, + 0x57, 0xb1, 0x95, 0xad, 0xcd, 0x00, 0x23, 0x3d, 0xba, 0x54, 0x84, 0xb6, + 0x29, 0x1f, 0x9d, 0x64, 0x8e, 0xf8, 0x83, 0x44, 0x86, 0x77, 0x97, 0x9c, + 0xec, 0x04, 0xb4, 0x34, 0xa6, 0xac, 0x2e, 0x75, 0xe9, 0x98, 0x5d, 0xe2, + 0x3d, 0xb0, 0x29, 0x2f, 0xc1, 0x11, 0x8c, 0x9f, 0xfa, 0x9d, 0x81, 0x81, + 0xe7, 0x33, 0x8d, 0xb7, 0x92, 0xb7, 0x30, 0xd7, 0xb9, 0xe3, 0x49, 0x59, + 0x2f, 0x68, 0x09, 0x98, 0x72, 0x15, 0x39, 0x15, 0xea, 0x3d, 0x6b, 0x8b, + 0x46, 0x53, 0xc6, 0x33, 0x45, 0x8f, 0x80, 0x3b, 0x32, 0xa4, 0xc2, 0xe0, + 0xf2, 0x72, 0x90, 0x25, 0x6e, 0x4e, 0x3f, 0x8a, 0x3b, 0x08, 0x38, 0xa1, + 0xc4, 0x50, 0xe4, 0xe1, 0x8c, 0x1a, 0x29, 0xa3, 0x7d, 0xdf, 0x5e, 0xa1, + 0x43, 0xde, 0x4b, 0x66, 0xff, 0x04, 0x90, 0x3e, 0xd5, 0xcf, 0x16, 0x23, + 0xe1, 0x58, 0xd4, 0x87, 0xc6, 0x08, 0xe9, 0x7f, 0x21, 0x1c, 0xd8, 0x1d, + 0xca, 0x23, 0xcb, 0x6e, 0x38, 0x07, 0x65, 0xf8, 0x22, 0xe3, 0x42, 0xbe, + 0x48, 0x4c, 0x05, 0x76, 0x39, 0x39, 0x60, 0x1c, 0xd6, 0x67}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 574 + {SEC_OID_SHA224, + 574, + {0x30, 0x82, 0x01, 0x0a, 0x02, 0x82, 0x01, 0x01, 0x00, 0x8f, 0x79, 0x35, + 0xd9, 0xb9, 0xaa, 0xe9, 0xbf, 0xab, 0xed, 0x88, 0x7a, 0xcf, 0x49, 0x51, + 0xb6, 0xf3, 0x2e, 0xc5, 0x9e, 0x3b, 0xaf, 0x37, 0x18, 0xe8, 0xea, 0xc4, + 0x96, 0x1f, 0x3e, 0xfd, 0x36, 0x06, 0xe7, 0x43, 0x51, 0xa9, 0xc4, 0x18, + 0x33, 0x39, 0xb8, 0x09, 0xe7, 0xc2, 0xae, 0x1c, 0x53, 0x9b, 0xa7, 0x47, + 0x5b, 0x85, 0xd0, 0x11, 0xad, 0xb8, 0xb4, 0x79, 0x87, 0x75, 0x49, 0x84, + 0x69, 0x5c, 0xac, 0x0e, 0x8f, 0x14, 0xb3, 0x36, 0x08, 0x28, 0xa2, 0x2f, + 0xfa, 0x27, 0x11, 0x0a, 0x3d, 0x62, 0xa9, 0x93, 0x45, 0x34, 0x09, 0xa0, + 0xfe, 0x69, 0x6c, 0x46, 0x58, 0xf8, 0x4b, 0xdd, 0x20, 0x81, 0x9c, 0x37, + 0x09, 0xa0, 0x10, 0x57, 0xb1, 0x95, 0xad, 0xcd, 0x00, 0x23, 0x3d, 0xba, + 0x54, 0x84, 0xb6, 0x29, 0x1f, 0x9d, 0x64, 0x8e, 0xf8, 0x83, 0x44, 0x86, + 0x77, 0x97, 0x9c, 0xec, 0x04, 0xb4, 0x34, 0xa6, 0xac, 0x2e, 0x75, 0xe9, + 0x98, 0x5d, 0xe2, 0x3d, 0xb0, 0x29, 0x2f, 0xc1, 0x11, 0x8c, 0x9f, 0xfa, + 0x9d, 0x81, 0x81, 0xe7, 0x33, 0x8d, 0xb7, 0x92, 0xb7, 0x30, 0xd7, 0xb9, + 0xe3, 0x49, 0x59, 0x2f, 0x68, 0x09, 0x98, 0x72, 0x15, 0x39, 0x15, 0xea, + 0x3d, 0x6b, 0x8b, 0x46, 0x53, 0xc6, 0x33, 0x45, 0x8f, 0x80, 0x3b, 0x32, + 0xa4, 0xc2, 0xe0, 0xf2, 0x72, 0x90, 0x25, 0x6e, 0x4e, 0x3f, 0x8a, 0x3b, + 0x08, 0x38, 0xa1, 0xc4, 0x50, 0xe4, 0xe1, 0x8c, 0x1a, 0x29, 0xa3, 0x7d, + 0xdf, 0x5e, 0xa1, 0x43, 0xde, 0x4b, 0x66, 0xff, 0x04, 0x90, 0x3e, 0xd5, + 0xcf, 0x16, 0x23, 0xe1, 0x58, 0xd4, 0x87, 0xc6, 0x08, 0xe9, 0x7f, 0x21, + 0x1c, 0xd8, 0x1d, 0xca, 0x23, 0xcb, 0x6e, 0x38, 0x07, 0x65, 0xf8, 0x22, + 0xe3, 0x42, 0xbe, 0x48, 0x4c, 0x05, 0x76, 0x39, 0x39, 0x60, 0x1c, 0xd6, + 0x67, 0x09, 0x03, 0x80, 0xfe, 0x01}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 575 + {SEC_OID_SHA224, + 575, + {0x30, 0x82, 0x01, 0x08, 0x02, 0x82, 0x01, 0x01, 0x00, 0x8f, 0x79, 0x35, + 0xd9, 0xb9, 0xaa, 0xe9, 0xbf, 0xab, 0xed, 0x88, 0x7a, 0xcf, 0x49, 0x51, + 0xb6, 0xf3, 0x2e, 0xc5, 0x9e, 0x3b, 0xaf, 0x37, 0x18, 0xe8, 0xea, 0xc4, + 0x96, 0x1f, 0x3e, 0xfd, 0x36, 0x06, 0xe7, 0x43, 0x51, 0xa9, 0xc4, 0x18, + 0x33, 0x39, 0xb8, 0x09, 0xe7, 0xc2, 0xae, 0x1c, 0x53, 0x9b, 0xa7, 0x47, + 0x5b, 0x85, 0xd0, 0x11, 0xad, 0xb8, 0xb4, 0x79, 0x87, 0x75, 0x49, 0x84, + 0x69, 0x5c, 0xac, 0x0e, 0x8f, 0x14, 0xb3, 0x36, 0x08, 0x28, 0xa2, 0x2f, + 0xfa, 0x27, 0x11, 0x0a, 0x3d, 0x62, 0xa9, 0x93, 0x45, 0x34, 0x09, 0xa0, + 0xfe, 0x69, 0x6c, 0x46, 0x58, 0xf8, 0x4b, 0xdd, 0x20, 0x81, 0x9c, 0x37, + 0x09, 0xa0, 0x10, 0x57, 0xb1, 0x95, 0xad, 0xcd, 0x00, 0x23, 0x3d, 0xba, + 0x54, 0x84, 0xb6, 0x29, 0x1f, 0x9d, 0x64, 0x8e, 0xf8, 0x83, 0x44, 0x86, + 0x77, 0x97, 0x9c, 0xec, 0x04, 0xb4, 0x34, 0xa6, 0xac, 0x2e, 0x75, 0xe9, + 0x98, 0x5d, 0xe2, 0x3d, 0xb0, 0x29, 0x2f, 0xc1, 0x11, 0x8c, 0x9f, 0xfa, + 0x9d, 0x81, 0x81, 0xe7, 0x33, 0x8d, 0xb7, 0x92, 0xb7, 0x30, 0xd7, 0xb9, + 0xe3, 0x49, 0x59, 0x2f, 0x68, 0x09, 0x98, 0x72, 0x15, 0x39, 0x15, 0xea, + 0x3d, 0x6b, 0x8b, 0x46, 0x53, 0xc6, 0x33, 0x45, 0x8f, 0x80, 0x3b, 0x32, + 0xa4, 0xc2, 0xe0, 0xf2, 0x72, 0x90, 0x25, 0x6e, 0x4e, 0x3f, 0x8a, 0x3b, + 0x08, 0x38, 0xa1, 0xc4, 0x50, 0xe4, 0xe1, 0x8c, 0x1a, 0x29, 0xa3, 0x7d, + 0xdf, 0x5e, 0xa1, 0x43, 0xde, 0x4b, 0x66, 0xff, 0x04, 0x90, 0x3e, 0xd5, + 0xcf, 0x16, 0x23, 0xe1, 0x58, 0xd4, 0x87, 0xc6, 0x08, 0xe9, 0x7f, 0x21, + 0x1c, 0xd8, 0x1d, 0xca, 0x23, 0xcb, 0x6e, 0x38, 0x07, 0x65, 0xf8, 0x22, + 0xe3, 0x42, 0xbe, 0x48, 0x4c, 0x05, 0x76, 0x39, 0x39, 0x60, 0x1c, 0xd6, + 0x67, 0x09, 0x01, 0x42}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 576 + {SEC_OID_SHA224, + 576, + {0x30, 0x24, 0x09, 0x03, 0x80, 0xfe, 0x01, 0x02, 0x1d, 0xff, + 0x45, 0x09, 0x69, 0x59, 0x7a, 0x87, 0x08, 0x20, 0x21, 0x18, + 0x05, 0x98, 0x36, 0x88, 0x38, 0x7a, 0x10, 0xcd, 0x4d, 0xcc, + 0x45, 0x1a, 0x7f, 0x3f, 0x43, 0x2a, 0x96, 0xa3}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 577 + {SEC_OID_SHA224, + 577, + {0x30, 0x08, 0x09, 0x03, 0x80, 0xfe, 0x01, 0x02, 0x01, 0x00}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 578 + {SEC_OID_SHA224, + 578, + {0x30, 0x08, 0x09, 0x03, 0x80, 0xfe, 0x01, 0x02, 0x01, 0x01}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 579 + {SEC_OID_SHA224, + 579, + {0x30, 0x08, 0x09, 0x03, 0x80, 0xfe, 0x01, 0x02, 0x01, 0xff}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 580 + {SEC_OID_SHA224, + 580, + {0x30, 0x23, 0x09, 0x03, 0x80, 0xfe, 0x01, 0x02, 0x1c, 0x5d, + 0x7b, 0x4b, 0x53, 0x42, 0xbc, 0x7b, 0xef, 0xef, 0x73, 0xfd, + 0x33, 0xe4, 0xbb, 0xe3, 0xc2, 0xf7, 0x99, 0x59, 0x19, 0xdd, + 0x72, 0xc0, 0x60, 0x5e, 0x6a, 0xb4, 0xae}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 581 + {SEC_OID_SHA224, + 581, + {0x30, 0x23, 0x09, 0x03, 0x80, 0xfe, 0x01, 0x02, 0x1c, 0x5d, + 0x7b, 0x4b, 0x53, 0x42, 0xbc, 0x7b, 0xef, 0xef, 0x73, 0xfd, + 0x33, 0xe4, 0xbb, 0xe3, 0xc2, 0xf7, 0x99, 0x59, 0x19, 0xdd, + 0x72, 0xc0, 0x60, 0x5e, 0x6a, 0xb4, 0xaf}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 582 + {SEC_OID_SHA224, + 582, + {0x30, 0x24, 0x09, 0x03, 0x80, 0xfe, 0x01, 0x02, 0x1d, 0x00, + 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78, 0xf7, 0xdf, 0xde, 0xe7, + 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef, 0x32, 0xb2, 0x33, + 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5c}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 583 + {SEC_OID_SHA224, + 583, + {0x30, 0x24, 0x09, 0x03, 0x80, 0xfe, 0x01, 0x02, 0x1d, 0x00, + 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78, 0xf7, 0xdf, 0xde, 0xe7, + 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef, 0x32, 0xb2, 0x33, + 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5d}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 584 + {SEC_OID_SHA224, + 584, + {0x30, 0x24, 0x09, 0x03, 0x80, 0xfe, 0x01, 0x02, 0x1d, 0x00, + 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78, 0xf7, 0xdf, 0xde, 0xe7, + 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef, 0x32, 0xb2, 0x33, + 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5e}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 585 + {SEC_OID_SHA224, + 585, + {0x30, 0x24, 0x09, 0x03, 0x80, 0xfe, 0x01, 0x02, 0x1d, 0x01, + 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, + 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, + 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 586 + {SEC_OID_SHA224, + 586, + {0x30, 0x82, 0x01, 0x0a, 0x09, 0x03, 0x80, 0xfe, 0x01, 0x02, 0x82, 0x01, + 0x01, 0x00, 0x8f, 0x79, 0x35, 0xd9, 0xb9, 0xaa, 0xe9, 0xbf, 0xab, 0xed, + 0x88, 0x7a, 0xcf, 0x49, 0x51, 0xb6, 0xf3, 0x2e, 0xc5, 0x9e, 0x3b, 0xaf, + 0x37, 0x18, 0xe8, 0xea, 0xc4, 0x96, 0x1f, 0x3e, 0xfd, 0x36, 0x06, 0xe7, + 0x43, 0x51, 0xa9, 0xc4, 0x18, 0x33, 0x39, 0xb8, 0x09, 0xe7, 0xc2, 0xae, + 0x1c, 0x53, 0x9b, 0xa7, 0x47, 0x5b, 0x85, 0xd0, 0x11, 0xad, 0xb8, 0xb4, + 0x79, 0x87, 0x75, 0x49, 0x84, 0x69, 0x5c, 0xac, 0x0e, 0x8f, 0x14, 0xb3, + 0x36, 0x08, 0x28, 0xa2, 0x2f, 0xfa, 0x27, 0x11, 0x0a, 0x3d, 0x62, 0xa9, + 0x93, 0x45, 0x34, 0x09, 0xa0, 0xfe, 0x69, 0x6c, 0x46, 0x58, 0xf8, 0x4b, + 0xdd, 0x20, 0x81, 0x9c, 0x37, 0x09, 0xa0, 0x10, 0x57, 0xb1, 0x95, 0xad, + 0xcd, 0x00, 0x23, 0x3d, 0xba, 0x54, 0x84, 0xb6, 0x29, 0x1f, 0x9d, 0x64, + 0x8e, 0xf8, 0x83, 0x44, 0x86, 0x77, 0x97, 0x9c, 0xec, 0x04, 0xb4, 0x34, + 0xa6, 0xac, 0x2e, 0x75, 0xe9, 0x98, 0x5d, 0xe2, 0x3d, 0xb0, 0x29, 0x2f, + 0xc1, 0x11, 0x8c, 0x9f, 0xfa, 0x9d, 0x81, 0x81, 0xe7, 0x33, 0x8d, 0xb7, + 0x92, 0xb7, 0x30, 0xd7, 0xb9, 0xe3, 0x49, 0x59, 0x2f, 0x68, 0x09, 0x98, + 0x72, 0x15, 0x39, 0x15, 0xea, 0x3d, 0x6b, 0x8b, 0x46, 0x53, 0xc6, 0x33, + 0x45, 0x8f, 0x80, 0x3b, 0x32, 0xa4, 0xc2, 0xe0, 0xf2, 0x72, 0x90, 0x25, + 0x6e, 0x4e, 0x3f, 0x8a, 0x3b, 0x08, 0x38, 0xa1, 0xc4, 0x50, 0xe4, 0xe1, + 0x8c, 0x1a, 0x29, 0xa3, 0x7d, 0xdf, 0x5e, 0xa1, 0x43, 0xde, 0x4b, 0x66, + 0xff, 0x04, 0x90, 0x3e, 0xd5, 0xcf, 0x16, 0x23, 0xe1, 0x58, 0xd4, 0x87, + 0xc6, 0x08, 0xe9, 0x7f, 0x21, 0x1c, 0xd8, 0x1d, 0xca, 0x23, 0xcb, 0x6e, + 0x38, 0x07, 0x65, 0xf8, 0x22, 0xe3, 0x42, 0xbe, 0x48, 0x4c, 0x05, 0x76, + 0x39, 0x39, 0x60, 0x1c, 0xd6, 0x67}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 587 + {SEC_OID_SHA224, + 587, + {0x30, 0x0a, 0x09, 0x03, 0x80, 0xfe, 0x01, 0x09, 0x03, 0x80, 0xfe, 0x01}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 588 + {SEC_OID_SHA224, + 588, + {0x30, 0x08, 0x09, 0x03, 0x80, 0xfe, 0x01, 0x09, 0x01, 0x42}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: Signature encoding contains wrong type. + // tcID: 589 + {SEC_OID_SHA224, + 589, + {0x30, 0x06, 0x02, 0x01, 0x01, 0x0c, 0x01, 0x30}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: Signature encoding contains wrong type. + // tcID: 590 + {SEC_OID_SHA224, + 590, + {0x30, 0x05, 0x02, 0x01, 0x01, 0x0c, 0x00}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: Signature encoding contains wrong type. + // tcID: 591 + {SEC_OID_SHA224, + 591, + {0x30, 0x09, 0x0c, 0x02, 0x25, 0x73, 0x0c, 0x03, 0x73, 0x25, 0x73}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: Signature encoding contains wrong type. + // tcID: 592 + {SEC_OID_SHA224, + 592, + {0x30, 0x08, 0x02, 0x01, 0x01, 0x30, 0x03, 0x02, 0x01, 0x00}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: Signature encoding contains wrong type. + // tcID: 593 + {SEC_OID_SHA224, + 593, + {0x30, 0x03, 0x02, 0x01, 0x01}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: Signature encoding contains wrong type. + // tcID: 594 + {SEC_OID_SHA224, + 594, + {0x30, 0x06, 0x02, 0x01, 0x01, 0x01, 0x01, 0x00}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + false}, + + // Comment: random signature + // tcID: 595 + {SEC_OID_SHA224, + 595, + {0x30, 0x3e, 0x02, 0x1d, 0x00, 0x85, 0xc7, 0x71, 0xec, 0xf9, 0xc7, + 0x7d, 0xeb, 0xae, 0x0c, 0x54, 0xf7, 0x49, 0xdb, 0xa4, 0xb0, 0x7a, + 0xe5, 0x19, 0xca, 0x10, 0x37, 0x09, 0x1d, 0xd6, 0xf2, 0x94, 0xcf, + 0x02, 0x1d, 0x00, 0xa0, 0x2f, 0x74, 0x98, 0x51, 0x98, 0xcf, 0x88, + 0xe3, 0x10, 0xe5, 0x52, 0x77, 0xba, 0x59, 0x8b, 0x33, 0x61, 0x64, + 0x85, 0x0f, 0xdd, 0x53, 0x08, 0xa7, 0xbe, 0xb1, 0xa7}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + true}, + + // Comment: random signature + // tcID: 596 + {SEC_OID_SHA224, + 596, + {0x30, 0x3c, 0x02, 0x1c, 0x04, 0x3c, 0xd5, 0x58, 0x0b, 0x8b, 0xfb, + 0x59, 0x75, 0xed, 0xef, 0x13, 0x2d, 0x6d, 0xe7, 0x84, 0x80, 0x96, + 0x39, 0x2e, 0x0a, 0xdf, 0x46, 0x34, 0x2b, 0xad, 0x7b, 0xb7, 0x02, + 0x1c, 0x14, 0x2b, 0x65, 0x72, 0xce, 0x61, 0xb0, 0x32, 0xd4, 0x5d, + 0x45, 0x97, 0xa8, 0x8c, 0x4e, 0x54, 0xdd, 0x59, 0x3f, 0xa7, 0xca, + 0x6c, 0x8e, 0x68, 0x82, 0xdf, 0x77, 0xf6}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + true}, + + // Comment: random signature + // tcID: 597 + {SEC_OID_SHA224, + 597, + {0x30, 0x3d, 0x02, 0x1d, 0x00, 0x91, 0x4e, 0x4f, 0x7b, 0xa8, 0xdf, + 0x44, 0xcf, 0x63, 0xc5, 0x7d, 0x21, 0x9c, 0x6b, 0x5d, 0xa0, 0x93, + 0xfe, 0x3a, 0x94, 0x60, 0x4b, 0xd2, 0xef, 0x88, 0xb6, 0x30, 0xf5, + 0x02, 0x1c, 0x6a, 0x7b, 0x80, 0x4c, 0xbf, 0xc6, 0x99, 0x37, 0x90, + 0x3b, 0xbd, 0x0c, 0x8f, 0x67, 0x30, 0x6a, 0x6e, 0x8b, 0xf0, 0xd0, + 0x50, 0x1a, 0xe3, 0xf3, 0x19, 0x0d, 0xca, 0x19}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + true}, + + // Comment: random signature + // tcID: 598 + {SEC_OID_SHA224, + 598, + {0x30, 0x3d, 0x02, 0x1c, 0x0a, 0x8f, 0xfb, 0x16, 0x0d, 0xa0, 0xff, + 0xe3, 0x19, 0xe7, 0xd3, 0xa5, 0xea, 0x29, 0x9f, 0x53, 0x1f, 0x84, + 0x21, 0xbf, 0xdc, 0xfd, 0x6b, 0xb6, 0x6c, 0x6a, 0xdc, 0xf2, 0x02, + 0x1d, 0x00, 0x8a, 0x75, 0xe2, 0xcb, 0xaa, 0x70, 0x9b, 0x2b, 0x5d, + 0x81, 0xd3, 0x46, 0xf6, 0xe9, 0x0a, 0x8d, 0xc3, 0x53, 0xc5, 0x83, + 0x53, 0x93, 0xb1, 0xd5, 0xa6, 0x65, 0x3f, 0x3c}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + true}, + + // Comment: random signature + // tcID: 599 + {SEC_OID_SHA224, + 599, + {0x30, 0x3d, 0x02, 0x1d, 0x00, 0xa7, 0xf1, 0x64, 0xd3, 0x2f, 0x44, + 0x68, 0x4f, 0xcd, 0xe8, 0x9f, 0x0f, 0xa9, 0x64, 0x71, 0x28, 0xbc, + 0x0c, 0x29, 0x0f, 0x08, 0xc9, 0xb9, 0xe6, 0xf7, 0xdb, 0x3f, 0xe1, + 0x02, 0x1c, 0x2d, 0xca, 0x34, 0xdb, 0x2f, 0x32, 0x0c, 0x95, 0xde, + 0x4e, 0x9d, 0xe4, 0x98, 0x6b, 0xbf, 0x50, 0x86, 0x07, 0x53, 0xd5, + 0xde, 0xb7, 0x28, 0x23, 0x76, 0x78, 0xaf, 0xb6}, + kPubKey3, + {0x48, 0x65, 0x6c, 0x6c, 0x6f}, + true}, + + // Comment: r,s = 1,1 + // tcID: 600 + {SEC_OID_SHA224, + 600, + {0x30, 0x06, 0x02, 0x01, 0x01, 0x02, 0x01, 0x01}, + kPubKey4, + {0x54, 0x65, 0x73, 0x74}, + true}, + + // Comment: r,s = 1,5 + // tcID: 601 + {SEC_OID_SHA224, + 601, + {0x30, 0x06, 0x02, 0x01, 0x01, 0x02, 0x01, 0x05}, + kPubKey4, + {0x54, 0x65, 0x73, 0x74}, + true}, + + // Comment: u2 small + // tcID: 602 + {SEC_OID_SHA224, + 602, + {0x30, 0x22, 0x02, 0x01, 0x01, 0x02, 0x1d, 0x00, 0x95, 0x92, 0x12, 0x1e, + 0xd1, 0x2d, 0x93, 0x19, 0x7f, 0x1f, 0xfb, 0x86, 0x3a, 0xc6, 0x39, 0x37, + 0xf2, 0x8e, 0xf4, 0xf6, 0x2f, 0x1e, 0x00, 0x9a, 0x30, 0xaa, 0xba, 0xb1}, + kPubKey4, + {0x54, 0x65, 0x73, 0x74}, + true}, + + // Comment: s == q-1 + // tcID: 603 + {SEC_OID_SHA224, + 603, + {0x30, 0x22, 0x02, 0x01, 0x01, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, + 0x85, 0x78, 0xf7, 0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, + 0xef, 0x32, 0xb2, 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5c}, + kPubKey4, + {0x54, 0x65, 0x73, 0x74}, + true}, + + // Comment: s == 1 + // tcID: 604 + {SEC_OID_SHA224, + 604, + {0x30, 0x21, 0x02, 0x1c, 0x5a, 0x25, 0x2f, 0x4f, 0xc5, 0x56, 0x18, 0x74, + 0x7f, 0xd9, 0x4b, 0x13, 0xc9, 0xbe, 0xe6, 0x2b, 0xb9, 0x58, 0xd8, 0x57, + 0x77, 0xcb, 0x07, 0xdd, 0x90, 0x71, 0x0d, 0x24, 0x02, 0x01, 0x01}, + kPubKey5, + {0x54, 0x65, 0x73, 0x74}, + true}, + + // Comment: Legacy:ASN encoding of r misses leading 0 + // tcID: 605 + {SEC_OID_SHA256, + 605, + {0x30, 0x3c, 0x02, 0x1c, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb, 0xd4, 0x46, + 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, 0x0a, 0x58, 0x0e, + 0x61, 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee, 0x93, 0x02, + 0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, 0xad, 0xe4, 0x14, + 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48, 0x0c, 0x38, 0x6c, + 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + true}, + + // Comment: valid + // tcID: 606 + {SEC_OID_SHA256, + 606, + {0x30, 0x3d, 0x02, 0x1d, 0x00, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb, 0xd4, + 0x46, 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, 0x0a, 0x58, + 0x0e, 0x61, 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee, 0x93, + 0x02, 0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, 0xad, 0xe4, + 0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48, 0x0c, 0x38, + 0x6c, 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + true}, + + // Comment: long form encoding of length of sequence + // tcID: 607 + {SEC_OID_SHA256, + 607, + {0x30, 0x81, 0x3d, 0x02, 0x1d, 0x00, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb, + 0xd4, 0x46, 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, 0x0a, + 0x58, 0x0e, 0x61, 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee, + 0x93, 0x02, 0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, 0xad, + 0xe4, 0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48, 0x0c, + 0x38, 0x6c, 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: length of sequence contains leading 0 + // tcID: 608 + {SEC_OID_SHA256, + 608, + {0x30, 0x82, 0x00, 0x3d, 0x02, 0x1d, 0x00, 0x9b, 0x6f, 0xe4, 0xa1, + 0xcb, 0xd4, 0x46, 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, + 0x0a, 0x58, 0x0e, 0x61, 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, + 0xee, 0x93, 0x02, 0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, + 0xad, 0xe4, 0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48, + 0x0c, 0x38, 0x6c, 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: wrong length of sequence + // tcID: 609 + {SEC_OID_SHA256, + 609, + {0x30, 0x3e, 0x02, 0x1d, 0x00, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb, 0xd4, + 0x46, 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, 0x0a, 0x58, + 0x0e, 0x61, 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee, 0x93, + 0x02, 0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, 0xad, 0xe4, + 0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48, 0x0c, 0x38, + 0x6c, 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: wrong length of sequence + // tcID: 610 + {SEC_OID_SHA256, + 610, + {0x30, 0x3c, 0x02, 0x1d, 0x00, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb, 0xd4, + 0x46, 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, 0x0a, 0x58, + 0x0e, 0x61, 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee, 0x93, + 0x02, 0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, 0xad, 0xe4, + 0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48, 0x0c, 0x38, + 0x6c, 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: uint32 overflow in length of sequence + // tcID: 611 + {SEC_OID_SHA256, + 611, + {0x30, 0x85, 0x01, 0x00, 0x00, 0x00, 0x3d, 0x02, 0x1d, 0x00, 0x9b, 0x6f, + 0xe4, 0xa1, 0xcb, 0xd4, 0x46, 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, + 0x13, 0x0a, 0x58, 0x0e, 0x61, 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, + 0xee, 0x93, 0x02, 0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, 0xad, + 0xe4, 0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48, 0x0c, 0x38, + 0x6c, 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: uint64 overflow in length of sequence + // tcID: 612 + {SEC_OID_SHA256, + 612, + {0x30, 0x89, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x3d, 0x02, + 0x1d, 0x00, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb, 0xd4, 0x46, 0x7d, 0x75, 0x84, + 0xae, 0x38, 0x2a, 0xe3, 0x13, 0x0a, 0x58, 0x0e, 0x61, 0xb9, 0x69, 0xa6, + 0x06, 0x73, 0x73, 0xd5, 0xee, 0x93, 0x02, 0x1c, 0x5f, 0xe8, 0x23, 0x47, + 0x11, 0xd6, 0x8f, 0xad, 0xe4, 0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, + 0x70, 0x48, 0x0c, 0x38, 0x6c, 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: length of sequence = 2**31 - 1 + // tcID: 613 + {SEC_OID_SHA256, + 613, + {0x30, 0x84, 0x7f, 0xff, 0xff, 0xff, 0x02, 0x1d, 0x00, 0x9b, 0x6f, 0xe4, + 0xa1, 0xcb, 0xd4, 0x46, 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, + 0x0a, 0x58, 0x0e, 0x61, 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee, + 0x93, 0x02, 0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, 0xad, 0xe4, + 0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48, 0x0c, 0x38, 0x6c, + 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: length of sequence = 2**32 - 1 + // tcID: 614 + {SEC_OID_SHA256, + 614, + {0x30, 0x84, 0xff, 0xff, 0xff, 0xff, 0x02, 0x1d, 0x00, 0x9b, 0x6f, 0xe4, + 0xa1, 0xcb, 0xd4, 0x46, 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, + 0x0a, 0x58, 0x0e, 0x61, 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee, + 0x93, 0x02, 0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, 0xad, 0xe4, + 0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48, 0x0c, 0x38, 0x6c, + 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: length of sequence = 2**40 - 1 + // tcID: 615 + {SEC_OID_SHA256, + 615, + {0x30, 0x85, 0xff, 0xff, 0xff, 0xff, 0xff, 0x02, 0x1d, 0x00, 0x9b, 0x6f, + 0xe4, 0xa1, 0xcb, 0xd4, 0x46, 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, + 0x13, 0x0a, 0x58, 0x0e, 0x61, 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, + 0xee, 0x93, 0x02, 0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, 0xad, + 0xe4, 0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48, 0x0c, 0x38, + 0x6c, 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: length of sequence = 2**64 - 1 + // tcID: 616 + {SEC_OID_SHA256, + 616, + {0x30, 0x88, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x02, 0x1d, + 0x00, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb, 0xd4, 0x46, 0x7d, 0x75, 0x84, 0xae, + 0x38, 0x2a, 0xe3, 0x13, 0x0a, 0x58, 0x0e, 0x61, 0xb9, 0x69, 0xa6, 0x06, + 0x73, 0x73, 0xd5, 0xee, 0x93, 0x02, 0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11, + 0xd6, 0x8f, 0xad, 0xe4, 0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, + 0x48, 0x0c, 0x38, 0x6c, 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: incorrect length of sequence + // tcID: 617 + {SEC_OID_SHA256, + 617, + {0x30, 0xff, 0x02, 0x1d, 0x00, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb, 0xd4, + 0x46, 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, 0x0a, 0x58, + 0x0e, 0x61, 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee, 0x93, + 0x02, 0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, 0xad, 0xe4, + 0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48, 0x0c, 0x38, + 0x6c, 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: indefinite length without termination + // tcID: 618 + {SEC_OID_SHA256, + 618, + {0x30, 0x80, 0x02, 0x1d, 0x00, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb, 0xd4, + 0x46, 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, 0x0a, 0x58, + 0x0e, 0x61, 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee, 0x93, + 0x02, 0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, 0xad, 0xe4, + 0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48, 0x0c, 0x38, + 0x6c, 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: indefinite length without termination + // tcID: 619 + {SEC_OID_SHA256, + 619, + {0x30, 0x3d, 0x02, 0x80, 0x00, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb, 0xd4, + 0x46, 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, 0x0a, 0x58, + 0x0e, 0x61, 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee, 0x93, + 0x02, 0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, 0xad, 0xe4, + 0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48, 0x0c, 0x38, + 0x6c, 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: indefinite length without termination + // tcID: 620 + {SEC_OID_SHA256, + 620, + {0x30, 0x3d, 0x02, 0x1d, 0x00, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb, 0xd4, + 0x46, 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, 0x0a, 0x58, + 0x0e, 0x61, 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee, 0x93, + 0x02, 0x80, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, 0xad, 0xe4, + 0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48, 0x0c, 0x38, + 0x6c, 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: removing sequence + // tcID: 621 + {SEC_OID_SHA256, 621, {}, kPubKey3, {0x54, 0x65, 0x73, 0x74}, false}, + + // Comment: lonely sequence tag + // tcID: 622 + {SEC_OID_SHA256, 622, {0x30}, kPubKey3, {0x54, 0x65, 0x73, 0x74}, false}, + + // Comment: appending 0's to sequence + // tcID: 623 + {SEC_OID_SHA256, + 623, + {0x30, 0x3f, 0x02, 0x1d, 0x00, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb, 0xd4, + 0x46, 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, 0x0a, 0x58, + 0x0e, 0x61, 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee, 0x93, + 0x02, 0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, 0xad, 0xe4, + 0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48, 0x0c, 0x38, + 0x6c, 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16, 0x00, 0x00}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: prepending 0's to sequence + // tcID: 624 + {SEC_OID_SHA256, + 624, + {0x30, 0x3f, 0x00, 0x00, 0x02, 0x1d, 0x00, 0x9b, 0x6f, 0xe4, 0xa1, + 0xcb, 0xd4, 0x46, 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, + 0x0a, 0x58, 0x0e, 0x61, 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, + 0xee, 0x93, 0x02, 0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, + 0xad, 0xe4, 0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48, + 0x0c, 0x38, 0x6c, 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: appending unused 0's to sequence + // tcID: 625 + {SEC_OID_SHA256, + 625, + {0x30, 0x3d, 0x02, 0x1d, 0x00, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb, 0xd4, + 0x46, 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, 0x0a, 0x58, + 0x0e, 0x61, 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee, 0x93, + 0x02, 0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, 0xad, 0xe4, + 0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48, 0x0c, 0x38, + 0x6c, 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16, 0x00, 0x00}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: appending null value to sequence + // tcID: 626 + {SEC_OID_SHA256, + 626, + {0x30, 0x3f, 0x02, 0x1d, 0x00, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb, 0xd4, + 0x46, 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, 0x0a, 0x58, + 0x0e, 0x61, 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee, 0x93, + 0x02, 0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, 0xad, 0xe4, + 0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48, 0x0c, 0x38, + 0x6c, 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16, 0x05, 0x00}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: including garbage + // tcID: 627 + {SEC_OID_SHA256, + 627, + {0x30, 0x42, 0x49, 0x81, 0x77, 0x30, 0x3d, 0x02, 0x1d, 0x00, 0x9b, 0x6f, + 0xe4, 0xa1, 0xcb, 0xd4, 0x46, 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, + 0x13, 0x0a, 0x58, 0x0e, 0x61, 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, + 0xee, 0x93, 0x02, 0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, 0xad, + 0xe4, 0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48, 0x0c, 0x38, + 0x6c, 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: including garbage + // tcID: 628 + {SEC_OID_SHA256, + 628, + {0x30, 0x41, 0x25, 0x00, 0x30, 0x3d, 0x02, 0x1d, 0x00, 0x9b, 0x6f, 0xe4, + 0xa1, 0xcb, 0xd4, 0x46, 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, + 0x0a, 0x58, 0x0e, 0x61, 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee, + 0x93, 0x02, 0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, 0xad, 0xe4, + 0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48, 0x0c, 0x38, 0x6c, + 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: including garbage + // tcID: 629 + {SEC_OID_SHA256, + 629, + {0x30, 0x3f, 0x30, 0x3d, 0x02, 0x1d, 0x00, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb, + 0xd4, 0x46, 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, 0x0a, 0x58, + 0x0e, 0x61, 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee, 0x93, 0x02, + 0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, 0xad, 0xe4, 0x14, 0x2c, + 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48, 0x0c, 0x38, 0x6c, 0x06, 0x2b, + 0x38, 0xfb, 0x42, 0xb1, 0x16, 0x00, 0x04, 0xde, 0xad, 0xbe, 0xef}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: including garbage + // tcID: 630 + {SEC_OID_SHA256, + 630, + {0x30, 0x42, 0x22, 0x22, 0x49, 0x81, 0x77, 0x02, 0x1d, 0x00, 0x9b, 0x6f, + 0xe4, 0xa1, 0xcb, 0xd4, 0x46, 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, + 0x13, 0x0a, 0x58, 0x0e, 0x61, 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, + 0xee, 0x93, 0x02, 0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, 0xad, + 0xe4, 0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48, 0x0c, 0x38, + 0x6c, 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: including garbage + // tcID: 631 + {SEC_OID_SHA256, + 631, + {0x30, 0x41, 0x22, 0x21, 0x25, 0x00, 0x02, 0x1d, 0x00, 0x9b, 0x6f, 0xe4, + 0xa1, 0xcb, 0xd4, 0x46, 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, + 0x0a, 0x58, 0x0e, 0x61, 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee, + 0x93, 0x02, 0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, 0xad, 0xe4, + 0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48, 0x0c, 0x38, 0x6c, + 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: including garbage + // tcID: 632 + {SEC_OID_SHA256, + 632, + {0x30, 0x45, 0x22, 0x1f, 0x02, 0x1d, 0x00, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb, + 0xd4, 0x46, 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, 0x0a, 0x58, + 0x0e, 0x61, 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee, 0x93, 0x00, + 0x04, 0xde, 0xad, 0xbe, 0xef, 0x02, 0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11, + 0xd6, 0x8f, 0xad, 0xe4, 0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, + 0x48, 0x0c, 0x38, 0x6c, 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: including garbage + // tcID: 633 + {SEC_OID_SHA256, + 633, + {0x30, 0x42, 0x02, 0x1d, 0x00, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb, 0xd4, 0x46, + 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, 0x0a, 0x58, 0x0e, 0x61, + 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee, 0x93, 0x22, 0x21, 0x49, + 0x81, 0x77, 0x02, 0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, 0xad, + 0xe4, 0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48, 0x0c, 0x38, + 0x6c, 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: including garbage + // tcID: 634 + {SEC_OID_SHA256, + 634, + {0x30, 0x41, 0x02, 0x1d, 0x00, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb, 0xd4, 0x46, + 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, 0x0a, 0x58, 0x0e, 0x61, + 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee, 0x93, 0x22, 0x20, 0x25, + 0x00, 0x02, 0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, 0xad, 0xe4, + 0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48, 0x0c, 0x38, 0x6c, + 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: including garbage + // tcID: 635 + {SEC_OID_SHA256, + 635, + {0x30, 0x45, 0x02, 0x1d, 0x00, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb, 0xd4, 0x46, + 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, 0x0a, 0x58, 0x0e, 0x61, + 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee, 0x93, 0x22, 0x1e, 0x02, + 0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, 0xad, 0xe4, 0x14, 0x2c, + 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48, 0x0c, 0x38, 0x6c, 0x06, 0x2b, + 0x38, 0xfb, 0x42, 0xb1, 0x16, 0x00, 0x04, 0xde, 0xad, 0xbe, 0xef}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: including undefined tags + // tcID: 636 + {SEC_OID_SHA256, + 636, + {0x30, 0x45, 0xaa, 0x00, 0xbb, 0x00, 0xcd, 0x00, 0x30, 0x3d, 0x02, 0x1d, + 0x00, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb, 0xd4, 0x46, 0x7d, 0x75, 0x84, 0xae, + 0x38, 0x2a, 0xe3, 0x13, 0x0a, 0x58, 0x0e, 0x61, 0xb9, 0x69, 0xa6, 0x06, + 0x73, 0x73, 0xd5, 0xee, 0x93, 0x02, 0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11, + 0xd6, 0x8f, 0xad, 0xe4, 0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, + 0x48, 0x0c, 0x38, 0x6c, 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: including undefined tags + // tcID: 637 + {SEC_OID_SHA256, + 637, + {0x30, 0x43, 0xaa, 0x02, 0xaa, 0xbb, 0x30, 0x3d, 0x02, 0x1d, 0x00, 0x9b, + 0x6f, 0xe4, 0xa1, 0xcb, 0xd4, 0x46, 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, + 0xe3, 0x13, 0x0a, 0x58, 0x0e, 0x61, 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, + 0xd5, 0xee, 0x93, 0x02, 0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, + 0xad, 0xe4, 0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48, 0x0c, + 0x38, 0x6c, 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: including undefined tags + // tcID: 638 + {SEC_OID_SHA256, + 638, + {0x30, 0x45, 0x22, 0x25, 0xaa, 0x00, 0xbb, 0x00, 0xcd, 0x00, 0x02, 0x1d, + 0x00, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb, 0xd4, 0x46, 0x7d, 0x75, 0x84, 0xae, + 0x38, 0x2a, 0xe3, 0x13, 0x0a, 0x58, 0x0e, 0x61, 0xb9, 0x69, 0xa6, 0x06, + 0x73, 0x73, 0xd5, 0xee, 0x93, 0x02, 0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11, + 0xd6, 0x8f, 0xad, 0xe4, 0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, + 0x48, 0x0c, 0x38, 0x6c, 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: including undefined tags + // tcID: 639 + {SEC_OID_SHA256, + 639, + {0x30, 0x43, 0x22, 0x23, 0xaa, 0x02, 0xaa, 0xbb, 0x02, 0x1d, 0x00, 0x9b, + 0x6f, 0xe4, 0xa1, 0xcb, 0xd4, 0x46, 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, + 0xe3, 0x13, 0x0a, 0x58, 0x0e, 0x61, 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, + 0xd5, 0xee, 0x93, 0x02, 0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, + 0xad, 0xe4, 0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48, 0x0c, + 0x38, 0x6c, 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: including undefined tags + // tcID: 640 + {SEC_OID_SHA256, + 640, + {0x30, 0x45, 0x02, 0x1d, 0x00, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb, 0xd4, 0x46, + 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, 0x0a, 0x58, 0x0e, 0x61, + 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee, 0x93, 0x22, 0x24, 0xaa, + 0x00, 0xbb, 0x00, 0xcd, 0x00, 0x02, 0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11, + 0xd6, 0x8f, 0xad, 0xe4, 0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, + 0x48, 0x0c, 0x38, 0x6c, 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: including undefined tags + // tcID: 641 + {SEC_OID_SHA256, + 641, + {0x30, 0x43, 0x02, 0x1d, 0x00, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb, 0xd4, 0x46, + 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, 0x0a, 0x58, 0x0e, 0x61, + 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee, 0x93, 0x22, 0x22, 0xaa, + 0x02, 0xaa, 0xbb, 0x02, 0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, + 0xad, 0xe4, 0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48, 0x0c, + 0x38, 0x6c, 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: truncated length of sequence + // tcID: 642 + {SEC_OID_SHA256, + 642, + {0x30, 0x81}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: using composition with indefinite length + // tcID: 643 + {SEC_OID_SHA256, + 643, + {0x30, 0x80, 0x30, 0x3d, 0x02, 0x1d, 0x00, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb, + 0xd4, 0x46, 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, 0x0a, 0x58, + 0x0e, 0x61, 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee, 0x93, 0x02, + 0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, 0xad, 0xe4, 0x14, 0x2c, + 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48, 0x0c, 0x38, 0x6c, 0x06, 0x2b, + 0x38, 0xfb, 0x42, 0xb1, 0x16, 0x00, 0x00}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: using composition with indefinite length + // tcID: 644 + {SEC_OID_SHA256, + 644, + {0x30, 0x41, 0x22, 0x80, 0x02, 0x1d, 0x00, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb, + 0xd4, 0x46, 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, 0x0a, 0x58, + 0x0e, 0x61, 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee, 0x93, 0x00, + 0x00, 0x02, 0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, 0xad, 0xe4, + 0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48, 0x0c, 0x38, 0x6c, + 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: using composition with indefinite length + // tcID: 645 + {SEC_OID_SHA256, + 645, + {0x30, 0x41, 0x02, 0x1d, 0x00, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb, 0xd4, 0x46, + 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, 0x0a, 0x58, 0x0e, 0x61, + 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee, 0x93, 0x22, 0x80, 0x02, + 0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, 0xad, 0xe4, 0x14, 0x2c, + 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48, 0x0c, 0x38, 0x6c, 0x06, 0x2b, + 0x38, 0xfb, 0x42, 0xb1, 0x16, 0x00, 0x00}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: using composition with wrong tag + // tcID: 646 + {SEC_OID_SHA256, + 646, + {0x30, 0x80, 0x31, 0x3d, 0x02, 0x1d, 0x00, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb, + 0xd4, 0x46, 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, 0x0a, 0x58, + 0x0e, 0x61, 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee, 0x93, 0x02, + 0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, 0xad, 0xe4, 0x14, 0x2c, + 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48, 0x0c, 0x38, 0x6c, 0x06, 0x2b, + 0x38, 0xfb, 0x42, 0xb1, 0x16, 0x00, 0x00}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: using composition with wrong tag + // tcID: 647 + {SEC_OID_SHA256, + 647, + {0x30, 0x41, 0x22, 0x80, 0x03, 0x1d, 0x00, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb, + 0xd4, 0x46, 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, 0x0a, 0x58, + 0x0e, 0x61, 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee, 0x93, 0x00, + 0x00, 0x02, 0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, 0xad, 0xe4, + 0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48, 0x0c, 0x38, 0x6c, + 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: using composition with wrong tag + // tcID: 648 + {SEC_OID_SHA256, + 648, + {0x30, 0x41, 0x02, 0x1d, 0x00, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb, 0xd4, 0x46, + 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, 0x0a, 0x58, 0x0e, 0x61, + 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee, 0x93, 0x22, 0x80, 0x03, + 0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, 0xad, 0xe4, 0x14, 0x2c, + 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48, 0x0c, 0x38, 0x6c, 0x06, 0x2b, + 0x38, 0xfb, 0x42, 0xb1, 0x16, 0x00, 0x00}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: Replacing sequence with NULL + // tcID: 649 + {SEC_OID_SHA256, + 649, + {0x05, 0x00}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: changing tag value of sequence + // tcID: 650 + {SEC_OID_SHA256, + 650, + {0x2e, 0x3d, 0x02, 0x1d, 0x00, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb, 0xd4, + 0x46, 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, 0x0a, 0x58, + 0x0e, 0x61, 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee, 0x93, + 0x02, 0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, 0xad, 0xe4, + 0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48, 0x0c, 0x38, + 0x6c, 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: changing tag value of sequence + // tcID: 651 + {SEC_OID_SHA256, + 651, + {0x2f, 0x3d, 0x02, 0x1d, 0x00, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb, 0xd4, + 0x46, 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, 0x0a, 0x58, + 0x0e, 0x61, 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee, 0x93, + 0x02, 0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, 0xad, 0xe4, + 0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48, 0x0c, 0x38, + 0x6c, 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: changing tag value of sequence + // tcID: 652 + {SEC_OID_SHA256, + 652, + {0x31, 0x3d, 0x02, 0x1d, 0x00, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb, 0xd4, + 0x46, 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, 0x0a, 0x58, + 0x0e, 0x61, 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee, 0x93, + 0x02, 0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, 0xad, 0xe4, + 0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48, 0x0c, 0x38, + 0x6c, 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: changing tag value of sequence + // tcID: 653 + {SEC_OID_SHA256, + 653, + {0x32, 0x3d, 0x02, 0x1d, 0x00, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb, 0xd4, + 0x46, 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, 0x0a, 0x58, + 0x0e, 0x61, 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee, 0x93, + 0x02, 0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, 0xad, 0xe4, + 0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48, 0x0c, 0x38, + 0x6c, 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: changing tag value of sequence + // tcID: 654 + {SEC_OID_SHA256, + 654, + {0xff, 0x3d, 0x02, 0x1d, 0x00, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb, 0xd4, + 0x46, 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, 0x0a, 0x58, + 0x0e, 0x61, 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee, 0x93, + 0x02, 0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, 0xad, 0xe4, + 0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48, 0x0c, 0x38, + 0x6c, 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: dropping value of sequence + // tcID: 655 + {SEC_OID_SHA256, + 655, + {0x30, 0x00}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: using composition for sequence + // tcID: 656 + {SEC_OID_SHA256, + 656, + {0x30, 0x41, 0x30, 0x01, 0x02, 0x30, 0x3c, 0x1d, 0x00, 0x9b, 0x6f, 0xe4, + 0xa1, 0xcb, 0xd4, 0x46, 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, + 0x0a, 0x58, 0x0e, 0x61, 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee, + 0x93, 0x02, 0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, 0xad, 0xe4, + 0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48, 0x0c, 0x38, 0x6c, + 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: truncated sequence + // tcID: 657 + {SEC_OID_SHA256, + 657, + {0x30, 0x3c, 0x02, 0x1d, 0x00, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb, 0xd4, + 0x46, 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, 0x0a, 0x58, + 0x0e, 0x61, 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee, 0x93, + 0x02, 0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, 0xad, 0xe4, + 0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48, 0x0c, 0x38, + 0x6c, 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: truncated sequence + // tcID: 658 + {SEC_OID_SHA256, + 658, + {0x30, 0x3c, 0x1d, 0x00, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb, 0xd4, 0x46, + 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, 0x0a, 0x58, 0x0e, + 0x61, 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee, 0x93, 0x02, + 0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, 0xad, 0xe4, 0x14, + 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48, 0x0c, 0x38, 0x6c, + 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: indefinite length + // tcID: 659 + {SEC_OID_SHA256, + 659, + {0x30, 0x80, 0x02, 0x1d, 0x00, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb, 0xd4, + 0x46, 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, 0x0a, 0x58, + 0x0e, 0x61, 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee, 0x93, + 0x02, 0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, 0xad, 0xe4, + 0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48, 0x0c, 0x38, + 0x6c, 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16, 0x00, 0x00}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: indefinite length with truncated delimiter + // tcID: 660 + {SEC_OID_SHA256, + 660, + {0x30, 0x80, 0x02, 0x1d, 0x00, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb, 0xd4, + 0x46, 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, 0x0a, 0x58, + 0x0e, 0x61, 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee, 0x93, + 0x02, 0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, 0xad, 0xe4, + 0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48, 0x0c, 0x38, + 0x6c, 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16, 0x00}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: indefinite length with additional element + // tcID: 661 + {SEC_OID_SHA256, + 661, + {0x30, 0x80, 0x02, 0x1d, 0x00, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb, 0xd4, 0x46, + 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, 0x0a, 0x58, 0x0e, 0x61, + 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee, 0x93, 0x02, 0x1c, 0x5f, + 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, 0xad, 0xe4, 0x14, 0x2c, 0x8c, 0xf6, + 0x0f, 0x38, 0x54, 0x70, 0x48, 0x0c, 0x38, 0x6c, 0x06, 0x2b, 0x38, 0xfb, + 0x42, 0xb1, 0x16, 0x05, 0x00, 0x00, 0x00}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: indefinite length with truncated element + // tcID: 662 + {SEC_OID_SHA256, + 662, + {0x30, 0x80, 0x02, 0x1d, 0x00, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb, 0xd4, 0x46, + 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, 0x0a, 0x58, 0x0e, 0x61, + 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee, 0x93, 0x02, 0x1c, 0x5f, + 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, 0xad, 0xe4, 0x14, 0x2c, 0x8c, 0xf6, + 0x0f, 0x38, 0x54, 0x70, 0x48, 0x0c, 0x38, 0x6c, 0x06, 0x2b, 0x38, 0xfb, + 0x42, 0xb1, 0x16, 0x06, 0x08, 0x11, 0x22, 0x00, 0x00}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: indefinite length with garbage + // tcID: 663 + {SEC_OID_SHA256, + 663, + {0x30, 0x80, 0x02, 0x1d, 0x00, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb, 0xd4, 0x46, + 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, 0x0a, 0x58, 0x0e, 0x61, + 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee, 0x93, 0x02, 0x1c, 0x5f, + 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, 0xad, 0xe4, 0x14, 0x2c, 0x8c, 0xf6, + 0x0f, 0x38, 0x54, 0x70, 0x48, 0x0c, 0x38, 0x6c, 0x06, 0x2b, 0x38, 0xfb, + 0x42, 0xb1, 0x16, 0x00, 0x00, 0xfe, 0x02, 0xbe, 0xef}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: indefinite length with nonempty EOC + // tcID: 664 + {SEC_OID_SHA256, + 664, + {0x30, 0x80, 0x02, 0x1d, 0x00, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb, 0xd4, 0x46, + 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, 0x0a, 0x58, 0x0e, 0x61, + 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee, 0x93, 0x02, 0x1c, 0x5f, + 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, 0xad, 0xe4, 0x14, 0x2c, 0x8c, 0xf6, + 0x0f, 0x38, 0x54, 0x70, 0x48, 0x0c, 0x38, 0x6c, 0x06, 0x2b, 0x38, 0xfb, + 0x42, 0xb1, 0x16, 0x00, 0x02, 0xbe, 0xef}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: prepend empty sequence + // tcID: 665 + {SEC_OID_SHA256, + 665, + {0x30, 0x3f, 0x30, 0x00, 0x02, 0x1d, 0x00, 0x9b, 0x6f, 0xe4, 0xa1, + 0xcb, 0xd4, 0x46, 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, + 0x0a, 0x58, 0x0e, 0x61, 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, + 0xee, 0x93, 0x02, 0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, + 0xad, 0xe4, 0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48, + 0x0c, 0x38, 0x6c, 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: append empty sequence + // tcID: 666 + {SEC_OID_SHA256, + 666, + {0x30, 0x3f, 0x02, 0x1d, 0x00, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb, 0xd4, + 0x46, 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, 0x0a, 0x58, + 0x0e, 0x61, 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee, 0x93, + 0x02, 0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, 0xad, 0xe4, + 0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48, 0x0c, 0x38, + 0x6c, 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16, 0x30, 0x00}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: append garbage with high tag number + // tcID: 667 + {SEC_OID_SHA256, + 667, + {0x30, 0x40, 0x02, 0x1d, 0x00, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb, 0xd4, + 0x46, 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, 0x0a, 0x58, + 0x0e, 0x61, 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee, 0x93, + 0x02, 0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, 0xad, 0xe4, + 0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48, 0x0c, 0x38, + 0x6c, 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16, 0xbf, 0x7f, 0x00}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: sequence of sequence + // tcID: 668 + {SEC_OID_SHA256, + 668, + {0x30, 0x3f, 0x30, 0x3d, 0x02, 0x1d, 0x00, 0x9b, 0x6f, 0xe4, 0xa1, + 0xcb, 0xd4, 0x46, 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, + 0x0a, 0x58, 0x0e, 0x61, 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, + 0xee, 0x93, 0x02, 0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, + 0xad, 0xe4, 0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48, + 0x0c, 0x38, 0x6c, 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: truncated sequence: removed last 1 elements + // tcID: 669 + {SEC_OID_SHA256, + 669, + {0x30, 0x1f, 0x02, 0x1d, 0x00, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb, 0xd4, + 0x46, 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, 0x0a, 0x58, + 0x0e, 0x61, 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee, 0x93}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: repeating element in sequence + // tcID: 670 + {SEC_OID_SHA256, + 670, + {0x30, 0x5b, 0x02, 0x1d, 0x00, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb, 0xd4, 0x46, + 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, 0x0a, 0x58, 0x0e, 0x61, + 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee, 0x93, 0x02, 0x1c, 0x5f, + 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, 0xad, 0xe4, 0x14, 0x2c, 0x8c, 0xf6, + 0x0f, 0x38, 0x54, 0x70, 0x48, 0x0c, 0x38, 0x6c, 0x06, 0x2b, 0x38, 0xfb, + 0x42, 0xb1, 0x16, 0x02, 0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, + 0xad, 0xe4, 0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48, 0x0c, + 0x38, 0x6c, 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: long form encoding of length of integer + // tcID: 671 + {SEC_OID_SHA256, + 671, + {0x30, 0x3e, 0x02, 0x81, 0x1d, 0x00, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb, + 0xd4, 0x46, 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, 0x0a, + 0x58, 0x0e, 0x61, 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee, + 0x93, 0x02, 0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, 0xad, + 0xe4, 0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48, 0x0c, + 0x38, 0x6c, 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: long form encoding of length of integer + // tcID: 672 + {SEC_OID_SHA256, + 672, + {0x30, 0x3e, 0x02, 0x1d, 0x00, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb, 0xd4, + 0x46, 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, 0x0a, 0x58, + 0x0e, 0x61, 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee, 0x93, + 0x02, 0x81, 0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, 0xad, + 0xe4, 0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48, 0x0c, + 0x38, 0x6c, 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: length of integer contains leading 0 + // tcID: 673 + {SEC_OID_SHA256, + 673, + {0x30, 0x3f, 0x02, 0x82, 0x00, 0x1d, 0x00, 0x9b, 0x6f, 0xe4, 0xa1, + 0xcb, 0xd4, 0x46, 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, + 0x0a, 0x58, 0x0e, 0x61, 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, + 0xee, 0x93, 0x02, 0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, + 0xad, 0xe4, 0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48, + 0x0c, 0x38, 0x6c, 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: length of integer contains leading 0 + // tcID: 674 + {SEC_OID_SHA256, + 674, + {0x30, 0x3f, 0x02, 0x1d, 0x00, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb, 0xd4, + 0x46, 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, 0x0a, 0x58, + 0x0e, 0x61, 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee, 0x93, + 0x02, 0x82, 0x00, 0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, + 0xad, 0xe4, 0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48, + 0x0c, 0x38, 0x6c, 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: wrong length of integer + // tcID: 675 + {SEC_OID_SHA256, + 675, + {0x30, 0x3d, 0x02, 0x1e, 0x00, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb, 0xd4, + 0x46, 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, 0x0a, 0x58, + 0x0e, 0x61, 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee, 0x93, + 0x02, 0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, 0xad, 0xe4, + 0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48, 0x0c, 0x38, + 0x6c, 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: wrong length of integer + // tcID: 676 + {SEC_OID_SHA256, + 676, + {0x30, 0x3d, 0x02, 0x1c, 0x00, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb, 0xd4, + 0x46, 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, 0x0a, 0x58, + 0x0e, 0x61, 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee, 0x93, + 0x02, 0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, 0xad, 0xe4, + 0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48, 0x0c, 0x38, + 0x6c, 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: wrong length of integer + // tcID: 677 + {SEC_OID_SHA256, + 677, + {0x30, 0x3d, 0x02, 0x1d, 0x00, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb, 0xd4, + 0x46, 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, 0x0a, 0x58, + 0x0e, 0x61, 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee, 0x93, + 0x02, 0x1d, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, 0xad, 0xe4, + 0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48, 0x0c, 0x38, + 0x6c, 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: wrong length of integer + // tcID: 678 + {SEC_OID_SHA256, + 678, + {0x30, 0x3d, 0x02, 0x1d, 0x00, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb, 0xd4, + 0x46, 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, 0x0a, 0x58, + 0x0e, 0x61, 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee, 0x93, + 0x02, 0x1b, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, 0xad, 0xe4, + 0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48, 0x0c, 0x38, + 0x6c, 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: uint32 overflow in length of integer + // tcID: 679 + {SEC_OID_SHA256, + 679, + {0x30, 0x42, 0x02, 0x85, 0x01, 0x00, 0x00, 0x00, 0x1d, 0x00, 0x9b, 0x6f, + 0xe4, 0xa1, 0xcb, 0xd4, 0x46, 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, + 0x13, 0x0a, 0x58, 0x0e, 0x61, 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, + 0xee, 0x93, 0x02, 0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, 0xad, + 0xe4, 0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48, 0x0c, 0x38, + 0x6c, 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: uint32 overflow in length of integer + // tcID: 680 + {SEC_OID_SHA256, + 680, + {0x30, 0x42, 0x02, 0x1d, 0x00, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb, 0xd4, 0x46, + 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, 0x0a, 0x58, 0x0e, 0x61, + 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee, 0x93, 0x02, 0x85, 0x01, + 0x00, 0x00, 0x00, 0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, 0xad, + 0xe4, 0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48, 0x0c, 0x38, + 0x6c, 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: uint64 overflow in length of integer + // tcID: 681 + {SEC_OID_SHA256, + 681, + {0x30, 0x46, 0x02, 0x89, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, + 0x1d, 0x00, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb, 0xd4, 0x46, 0x7d, 0x75, 0x84, + 0xae, 0x38, 0x2a, 0xe3, 0x13, 0x0a, 0x58, 0x0e, 0x61, 0xb9, 0x69, 0xa6, + 0x06, 0x73, 0x73, 0xd5, 0xee, 0x93, 0x02, 0x1c, 0x5f, 0xe8, 0x23, 0x47, + 0x11, 0xd6, 0x8f, 0xad, 0xe4, 0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, + 0x70, 0x48, 0x0c, 0x38, 0x6c, 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: uint64 overflow in length of integer + // tcID: 682 + {SEC_OID_SHA256, + 682, + {0x30, 0x46, 0x02, 0x1d, 0x00, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb, 0xd4, 0x46, + 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, 0x0a, 0x58, 0x0e, 0x61, + 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee, 0x93, 0x02, 0x89, 0x01, + 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x1c, 0x5f, 0xe8, 0x23, 0x47, + 0x11, 0xd6, 0x8f, 0xad, 0xe4, 0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, + 0x70, 0x48, 0x0c, 0x38, 0x6c, 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: length of integer = 2**31 - 1 + // tcID: 683 + {SEC_OID_SHA256, + 683, + {0x30, 0x41, 0x02, 0x84, 0x7f, 0xff, 0xff, 0xff, 0x00, 0x9b, 0x6f, 0xe4, + 0xa1, 0xcb, 0xd4, 0x46, 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, + 0x0a, 0x58, 0x0e, 0x61, 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee, + 0x93, 0x02, 0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, 0xad, 0xe4, + 0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48, 0x0c, 0x38, 0x6c, + 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: length of integer = 2**31 - 1 + // tcID: 684 + {SEC_OID_SHA256, + 684, + {0x30, 0x41, 0x02, 0x1d, 0x00, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb, 0xd4, 0x46, + 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, 0x0a, 0x58, 0x0e, 0x61, + 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee, 0x93, 0x02, 0x84, 0x7f, + 0xff, 0xff, 0xff, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, 0xad, 0xe4, + 0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48, 0x0c, 0x38, 0x6c, + 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: length of integer = 2**32 - 1 + // tcID: 685 + {SEC_OID_SHA256, + 685, + {0x30, 0x41, 0x02, 0x84, 0xff, 0xff, 0xff, 0xff, 0x00, 0x9b, 0x6f, 0xe4, + 0xa1, 0xcb, 0xd4, 0x46, 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, + 0x0a, 0x58, 0x0e, 0x61, 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee, + 0x93, 0x02, 0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, 0xad, 0xe4, + 0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48, 0x0c, 0x38, 0x6c, + 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: length of integer = 2**32 - 1 + // tcID: 686 + {SEC_OID_SHA256, + 686, + {0x30, 0x41, 0x02, 0x1d, 0x00, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb, 0xd4, 0x46, + 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, 0x0a, 0x58, 0x0e, 0x61, + 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee, 0x93, 0x02, 0x84, 0xff, + 0xff, 0xff, 0xff, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, 0xad, 0xe4, + 0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48, 0x0c, 0x38, 0x6c, + 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: length of integer = 2**40 - 1 + // tcID: 687 + {SEC_OID_SHA256, + 687, + {0x30, 0x42, 0x02, 0x85, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x9b, 0x6f, + 0xe4, 0xa1, 0xcb, 0xd4, 0x46, 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, + 0x13, 0x0a, 0x58, 0x0e, 0x61, 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, + 0xee, 0x93, 0x02, 0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, 0xad, + 0xe4, 0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48, 0x0c, 0x38, + 0x6c, 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: length of integer = 2**40 - 1 + // tcID: 688 + {SEC_OID_SHA256, + 688, + {0x30, 0x42, 0x02, 0x1d, 0x00, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb, 0xd4, 0x46, + 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, 0x0a, 0x58, 0x0e, 0x61, + 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee, 0x93, 0x02, 0x85, 0xff, + 0xff, 0xff, 0xff, 0xff, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, 0xad, + 0xe4, 0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48, 0x0c, 0x38, + 0x6c, 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: length of integer = 2**64 - 1 + // tcID: 689 + {SEC_OID_SHA256, + 689, + {0x30, 0x45, 0x02, 0x88, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, + 0x00, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb, 0xd4, 0x46, 0x7d, 0x75, 0x84, 0xae, + 0x38, 0x2a, 0xe3, 0x13, 0x0a, 0x58, 0x0e, 0x61, 0xb9, 0x69, 0xa6, 0x06, + 0x73, 0x73, 0xd5, 0xee, 0x93, 0x02, 0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11, + 0xd6, 0x8f, 0xad, 0xe4, 0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, + 0x48, 0x0c, 0x38, 0x6c, 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: length of integer = 2**64 - 1 + // tcID: 690 + {SEC_OID_SHA256, + 690, + {0x30, 0x45, 0x02, 0x1d, 0x00, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb, 0xd4, 0x46, + 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, 0x0a, 0x58, 0x0e, 0x61, + 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee, 0x93, 0x02, 0x88, 0xff, + 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x5f, 0xe8, 0x23, 0x47, 0x11, + 0xd6, 0x8f, 0xad, 0xe4, 0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, + 0x48, 0x0c, 0x38, 0x6c, 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: incorrect length of integer + // tcID: 691 + {SEC_OID_SHA256, + 691, + {0x30, 0x3d, 0x02, 0xff, 0x00, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb, 0xd4, + 0x46, 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, 0x0a, 0x58, + 0x0e, 0x61, 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee, 0x93, + 0x02, 0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, 0xad, 0xe4, + 0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48, 0x0c, 0x38, + 0x6c, 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: incorrect length of integer + // tcID: 692 + {SEC_OID_SHA256, + 692, + {0x30, 0x3d, 0x02, 0x1d, 0x00, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb, 0xd4, + 0x46, 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, 0x0a, 0x58, + 0x0e, 0x61, 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee, 0x93, + 0x02, 0xff, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, 0xad, 0xe4, + 0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48, 0x0c, 0x38, + 0x6c, 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: removing integer + // tcID: 693 + {SEC_OID_SHA256, + 693, + {0x30, 0x1e, 0x02, 0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, + 0xad, 0xe4, 0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48, + 0x0c, 0x38, 0x6c, 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: lonely integer tag + // tcID: 694 + {SEC_OID_SHA256, + 694, + {0x30, 0x1f, 0x02, 0x02, 0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, + 0x8f, 0xad, 0xe4, 0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, + 0x48, 0x0c, 0x38, 0x6c, 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: lonely integer tag + // tcID: 695 + {SEC_OID_SHA256, + 695, + {0x30, 0x20, 0x02, 0x1d, 0x00, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb, 0xd4, 0x46, + 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, 0x0a, 0x58, 0x0e, 0x61, + 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee, 0x93, 0x02}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: appending 0's to integer + // tcID: 696 + {SEC_OID_SHA256, + 696, + {0x30, 0x3f, 0x02, 0x1f, 0x00, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb, 0xd4, + 0x46, 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, 0x0a, 0x58, + 0x0e, 0x61, 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee, 0x93, + 0x00, 0x00, 0x02, 0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, + 0xad, 0xe4, 0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48, + 0x0c, 0x38, 0x6c, 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: appending 0's to integer + // tcID: 697 + {SEC_OID_SHA256, + 697, + {0x30, 0x3f, 0x02, 0x1d, 0x00, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb, 0xd4, + 0x46, 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, 0x0a, 0x58, + 0x0e, 0x61, 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee, 0x93, + 0x02, 0x1e, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, 0xad, 0xe4, + 0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48, 0x0c, 0x38, + 0x6c, 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16, 0x00, 0x00}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: prepending 0's to integer + // tcID: 698 + {SEC_OID_SHA256, + 698, + {0x30, 0x3f, 0x02, 0x1f, 0x00, 0x00, 0x00, 0x9b, 0x6f, 0xe4, 0xa1, + 0xcb, 0xd4, 0x46, 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, + 0x0a, 0x58, 0x0e, 0x61, 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, + 0xee, 0x93, 0x02, 0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, + 0xad, 0xe4, 0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48, + 0x0c, 0x38, 0x6c, 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: prepending 0's to integer + // tcID: 699 + {SEC_OID_SHA256, + 699, + {0x30, 0x3f, 0x02, 0x1d, 0x00, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb, 0xd4, + 0x46, 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, 0x0a, 0x58, + 0x0e, 0x61, 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee, 0x93, + 0x02, 0x1e, 0x00, 0x00, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, + 0xad, 0xe4, 0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48, + 0x0c, 0x38, 0x6c, 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: appending unused 0's to integer + // tcID: 700 + {SEC_OID_SHA256, + 700, + {0x30, 0x3f, 0x02, 0x1d, 0x00, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb, 0xd4, + 0x46, 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, 0x0a, 0x58, + 0x0e, 0x61, 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee, 0x93, + 0x00, 0x00, 0x02, 0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, + 0xad, 0xe4, 0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48, + 0x0c, 0x38, 0x6c, 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: appending null value to integer + // tcID: 701 + {SEC_OID_SHA256, + 701, + {0x30, 0x3f, 0x02, 0x1f, 0x00, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb, 0xd4, + 0x46, 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, 0x0a, 0x58, + 0x0e, 0x61, 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee, 0x93, + 0x05, 0x00, 0x02, 0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, + 0xad, 0xe4, 0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48, + 0x0c, 0x38, 0x6c, 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: appending null value to integer + // tcID: 702 + {SEC_OID_SHA256, + 702, + {0x30, 0x3f, 0x02, 0x1d, 0x00, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb, 0xd4, + 0x46, 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, 0x0a, 0x58, + 0x0e, 0x61, 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee, 0x93, + 0x02, 0x1e, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, 0xad, 0xe4, + 0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48, 0x0c, 0x38, + 0x6c, 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16, 0x05, 0x00}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: truncated length of integer + // tcID: 703 + {SEC_OID_SHA256, + 703, + {0x30, 0x20, 0x02, 0x81, 0x02, 0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, + 0x8f, 0xad, 0xe4, 0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48, + 0x0c, 0x38, 0x6c, 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: truncated length of integer + // tcID: 704 + {SEC_OID_SHA256, + 704, + {0x30, 0x21, 0x02, 0x1d, 0x00, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb, 0xd4, 0x46, + 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, 0x0a, 0x58, 0x0e, 0x61, + 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee, 0x93, 0x02, 0x81}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: Replacing integer with NULL + // tcID: 705 + {SEC_OID_SHA256, + 705, + {0x30, 0x20, 0x05, 0x00, 0x02, 0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, + 0x8f, 0xad, 0xe4, 0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48, + 0x0c, 0x38, 0x6c, 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: Replacing integer with NULL + // tcID: 706 + {SEC_OID_SHA256, + 706, + {0x30, 0x21, 0x02, 0x1d, 0x00, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb, 0xd4, 0x46, + 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, 0x0a, 0x58, 0x0e, 0x61, + 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee, 0x93, 0x05, 0x00}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: changing tag value of integer + // tcID: 707 + {SEC_OID_SHA256, + 707, + {0x30, 0x3d, 0x00, 0x1d, 0x00, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb, 0xd4, + 0x46, 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, 0x0a, 0x58, + 0x0e, 0x61, 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee, 0x93, + 0x02, 0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, 0xad, 0xe4, + 0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48, 0x0c, 0x38, + 0x6c, 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: changing tag value of integer + // tcID: 708 + {SEC_OID_SHA256, + 708, + {0x30, 0x3d, 0x01, 0x1d, 0x00, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb, 0xd4, + 0x46, 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, 0x0a, 0x58, + 0x0e, 0x61, 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee, 0x93, + 0x02, 0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, 0xad, 0xe4, + 0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48, 0x0c, 0x38, + 0x6c, 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: changing tag value of integer + // tcID: 709 + {SEC_OID_SHA256, + 709, + {0x30, 0x3d, 0x03, 0x1d, 0x00, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb, 0xd4, + 0x46, 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, 0x0a, 0x58, + 0x0e, 0x61, 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee, 0x93, + 0x02, 0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, 0xad, 0xe4, + 0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48, 0x0c, 0x38, + 0x6c, 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: changing tag value of integer + // tcID: 710 + {SEC_OID_SHA256, + 710, + {0x30, 0x3d, 0x04, 0x1d, 0x00, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb, 0xd4, + 0x46, 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, 0x0a, 0x58, + 0x0e, 0x61, 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee, 0x93, + 0x02, 0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, 0xad, 0xe4, + 0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48, 0x0c, 0x38, + 0x6c, 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: changing tag value of integer + // tcID: 711 + {SEC_OID_SHA256, + 711, + {0x30, 0x3d, 0xff, 0x1d, 0x00, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb, 0xd4, + 0x46, 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, 0x0a, 0x58, + 0x0e, 0x61, 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee, 0x93, + 0x02, 0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, 0xad, 0xe4, + 0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48, 0x0c, 0x38, + 0x6c, 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: changing tag value of integer + // tcID: 712 + {SEC_OID_SHA256, + 712, + {0x30, 0x3d, 0x02, 0x1d, 0x00, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb, 0xd4, + 0x46, 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, 0x0a, 0x58, + 0x0e, 0x61, 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee, 0x93, + 0x00, 0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, 0xad, 0xe4, + 0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48, 0x0c, 0x38, + 0x6c, 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: changing tag value of integer + // tcID: 713 + {SEC_OID_SHA256, + 713, + {0x30, 0x3d, 0x02, 0x1d, 0x00, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb, 0xd4, + 0x46, 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, 0x0a, 0x58, + 0x0e, 0x61, 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee, 0x93, + 0x01, 0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, 0xad, 0xe4, + 0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48, 0x0c, 0x38, + 0x6c, 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: changing tag value of integer + // tcID: 714 + {SEC_OID_SHA256, + 714, + {0x30, 0x3d, 0x02, 0x1d, 0x00, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb, 0xd4, + 0x46, 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, 0x0a, 0x58, + 0x0e, 0x61, 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee, 0x93, + 0x03, 0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, 0xad, 0xe4, + 0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48, 0x0c, 0x38, + 0x6c, 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: changing tag value of integer + // tcID: 715 + {SEC_OID_SHA256, + 715, + {0x30, 0x3d, 0x02, 0x1d, 0x00, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb, 0xd4, + 0x46, 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, 0x0a, 0x58, + 0x0e, 0x61, 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee, 0x93, + 0x04, 0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, 0xad, 0xe4, + 0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48, 0x0c, 0x38, + 0x6c, 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: changing tag value of integer + // tcID: 716 + {SEC_OID_SHA256, + 716, + {0x30, 0x3d, 0x02, 0x1d, 0x00, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb, 0xd4, + 0x46, 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, 0x0a, 0x58, + 0x0e, 0x61, 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee, 0x93, + 0xff, 0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, 0xad, 0xe4, + 0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48, 0x0c, 0x38, + 0x6c, 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: dropping value of integer + // tcID: 717 + {SEC_OID_SHA256, + 717, + {0x30, 0x20, 0x02, 0x00, 0x02, 0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, + 0x8f, 0xad, 0xe4, 0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48, + 0x0c, 0x38, 0x6c, 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: dropping value of integer + // tcID: 718 + {SEC_OID_SHA256, + 718, + {0x30, 0x21, 0x02, 0x1d, 0x00, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb, 0xd4, 0x46, + 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, 0x0a, 0x58, 0x0e, 0x61, + 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee, 0x93, 0x02, 0x00}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: using composition for integer + // tcID: 719 + {SEC_OID_SHA256, + 719, + {0x30, 0x41, 0x22, 0x21, 0x02, 0x01, 0x00, 0x02, 0x1c, 0x9b, 0x6f, 0xe4, + 0xa1, 0xcb, 0xd4, 0x46, 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, + 0x0a, 0x58, 0x0e, 0x61, 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee, + 0x93, 0x02, 0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, 0xad, 0xe4, + 0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48, 0x0c, 0x38, 0x6c, + 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: using composition for integer + // tcID: 720 + {SEC_OID_SHA256, + 720, + {0x30, 0x41, 0x02, 0x1d, 0x00, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb, 0xd4, 0x46, + 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, 0x0a, 0x58, 0x0e, 0x61, + 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee, 0x93, 0x22, 0x20, 0x02, + 0x01, 0x5f, 0x02, 0x1b, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, 0xad, 0xe4, + 0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48, 0x0c, 0x38, 0x6c, + 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: modify first byte of integer + // tcID: 721 + {SEC_OID_SHA256, + 721, + {0x30, 0x3d, 0x02, 0x1d, 0x02, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb, 0xd4, + 0x46, 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, 0x0a, 0x58, + 0x0e, 0x61, 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee, 0x93, + 0x02, 0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, 0xad, 0xe4, + 0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48, 0x0c, 0x38, + 0x6c, 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: modify first byte of integer + // tcID: 722 + {SEC_OID_SHA256, + 722, + {0x30, 0x3d, 0x02, 0x1d, 0x00, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb, 0xd4, + 0x46, 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, 0x0a, 0x58, + 0x0e, 0x61, 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee, 0x93, + 0x02, 0x1c, 0x5d, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, 0xad, 0xe4, + 0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48, 0x0c, 0x38, + 0x6c, 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: modify last byte of integer + // tcID: 723 + {SEC_OID_SHA256, + 723, + {0x30, 0x3d, 0x02, 0x1d, 0x00, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb, 0xd4, + 0x46, 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, 0x0a, 0x58, + 0x0e, 0x61, 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee, 0x13, + 0x02, 0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, 0xad, 0xe4, + 0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48, 0x0c, 0x38, + 0x6c, 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: modify last byte of integer + // tcID: 724 + {SEC_OID_SHA256, + 724, + {0x30, 0x3d, 0x02, 0x1d, 0x00, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb, 0xd4, + 0x46, 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, 0x0a, 0x58, + 0x0e, 0x61, 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee, 0x93, + 0x02, 0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, 0xad, 0xe4, + 0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48, 0x0c, 0x38, + 0x6c, 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x96}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: truncated integer + // tcID: 725 + {SEC_OID_SHA256, + 725, + {0x30, 0x3c, 0x02, 0x1c, 0x00, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb, 0xd4, + 0x46, 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, 0x0a, 0x58, + 0x0e, 0x61, 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee, 0x02, + 0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, 0xad, 0xe4, 0x14, + 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48, 0x0c, 0x38, 0x6c, + 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: truncated integer + // tcID: 726 + {SEC_OID_SHA256, + 726, + {0x30, 0x3c, 0x02, 0x1d, 0x00, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb, 0xd4, + 0x46, 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, 0x0a, 0x58, + 0x0e, 0x61, 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee, 0x93, + 0x02, 0x1b, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, 0xad, 0xe4, + 0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48, 0x0c, 0x38, + 0x6c, 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: truncated integer + // tcID: 727 + {SEC_OID_SHA256, + 727, + {0x30, 0x3c, 0x02, 0x1d, 0x00, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb, 0xd4, + 0x46, 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, 0x0a, 0x58, + 0x0e, 0x61, 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee, 0x93, + 0x02, 0x1b, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, 0xad, 0xe4, 0x14, + 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48, 0x0c, 0x38, 0x6c, + 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: leading ff in integer + // tcID: 728 + {SEC_OID_SHA256, + 728, + {0x30, 0x3e, 0x02, 0x1e, 0xff, 0x00, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb, + 0xd4, 0x46, 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, 0x0a, + 0x58, 0x0e, 0x61, 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee, + 0x93, 0x02, 0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, 0xad, + 0xe4, 0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48, 0x0c, + 0x38, 0x6c, 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: leading ff in integer + // tcID: 729 + {SEC_OID_SHA256, + 729, + {0x30, 0x3e, 0x02, 0x1d, 0x00, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb, 0xd4, + 0x46, 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, 0x0a, 0x58, + 0x0e, 0x61, 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee, 0x93, + 0x02, 0x1d, 0xff, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, 0xad, + 0xe4, 0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48, 0x0c, + 0x38, 0x6c, 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: replaced integer by infinity + // tcID: 730 + {SEC_OID_SHA256, + 730, + {0x30, 0x21, 0x09, 0x01, 0x80, 0x02, 0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11, + 0xd6, 0x8f, 0xad, 0xe4, 0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, + 0x48, 0x0c, 0x38, 0x6c, 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: replaced integer by infinity + // tcID: 731 + {SEC_OID_SHA256, + 731, + {0x30, 0x22, 0x02, 0x1d, 0x00, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb, 0xd4, 0x46, + 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, 0x0a, 0x58, 0x0e, 0x61, + 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee, 0x93, 0x09, 0x01, 0x80}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: replacing integer with zero + // tcID: 732 + {SEC_OID_SHA256, + 732, + {0x30, 0x21, 0x02, 0x01, 0x00, 0x02, 0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11, + 0xd6, 0x8f, 0xad, 0xe4, 0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, + 0x48, 0x0c, 0x38, 0x6c, 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: replacing integer with zero + // tcID: 733 + {SEC_OID_SHA256, + 733, + {0x30, 0x22, 0x02, 0x1d, 0x00, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb, 0xd4, 0x46, + 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, 0x0a, 0x58, 0x0e, 0x61, + 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee, 0x93, 0x02, 0x01, 0x00}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: Modified r or s, e.g. by adding or subtracting the group order + // tcID: 734 + {SEC_OID_SHA256, + 734, + {0x30, 0x3d, 0x02, 0x1d, 0x01, 0x56, 0x66, 0x7b, 0x48, 0x51, 0x4d, + 0x3e, 0x5d, 0x54, 0x6c, 0xa8, 0x9f, 0xf4, 0x5a, 0xda, 0x90, 0x47, + 0x41, 0x13, 0xed, 0x24, 0x8b, 0x87, 0x34, 0x30, 0xab, 0x57, 0xf0, + 0x02, 0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, 0xad, 0xe4, + 0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48, 0x0c, 0x38, + 0x6c, 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: Modified r or s, e.g. by adding or subtracting the group order + // tcID: 735 + {SEC_OID_SHA256, + 735, + {0x30, 0x3c, 0x02, 0x1c, 0xe0, 0x79, 0x4d, 0xfb, 0x46, 0x5b, 0x4e, + 0x9d, 0x96, 0x9c, 0xb3, 0xd0, 0x61, 0x6b, 0x4b, 0x84, 0x68, 0xdb, + 0xaf, 0x85, 0xae, 0xc0, 0x85, 0xb2, 0xb7, 0x00, 0x85, 0x36, 0x02, + 0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, 0xad, 0xe4, 0x14, + 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48, 0x0c, 0x38, 0x6c, + 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: Modified r or s, e.g. by adding or subtracting the group order + // tcID: 736 + {SEC_OID_SHA256, + 736, + {0x30, 0x3d, 0x02, 0x1d, 0xff, 0x64, 0x90, 0x1b, 0x5e, 0x34, 0x2b, + 0xb9, 0x82, 0x8a, 0x7b, 0x51, 0xc7, 0xd5, 0x1c, 0xec, 0xf5, 0xa7, + 0xf1, 0x9e, 0x46, 0x96, 0x59, 0xf9, 0x8c, 0x8c, 0x2a, 0x11, 0x6d, + 0x02, 0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, 0xad, 0xe4, + 0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48, 0x0c, 0x38, + 0x6c, 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: Modified r or s, e.g. by adding or subtracting the group order + // tcID: 737 + {SEC_OID_SHA256, + 737, + {0x30, 0x3c, 0x02, 0x1c, 0x1f, 0x86, 0xb2, 0x04, 0xb9, 0xa4, 0xb1, + 0x62, 0x69, 0x63, 0x4c, 0x2f, 0x9e, 0x94, 0xb4, 0x7b, 0x97, 0x24, + 0x50, 0x7a, 0x51, 0x3f, 0x7a, 0x4d, 0x48, 0xff, 0x7a, 0xca, 0x02, + 0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, 0xad, 0xe4, 0x14, + 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48, 0x0c, 0x38, 0x6c, + 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: Modified r or s, e.g. by adding or subtracting the group order + // tcID: 738 + {SEC_OID_SHA256, + 738, + {0x30, 0x3d, 0x02, 0x1d, 0xfe, 0xa9, 0x99, 0x84, 0xb7, 0xae, 0xb2, + 0xc1, 0xa2, 0xab, 0x93, 0x57, 0x60, 0x0b, 0xa5, 0x25, 0x6f, 0xb8, + 0xbe, 0xec, 0x12, 0xdb, 0x74, 0x78, 0xcb, 0xcf, 0x54, 0xa8, 0x10, + 0x02, 0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, 0xad, 0xe4, + 0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48, 0x0c, 0x38, + 0x6c, 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: Modified r or s, e.g. by adding or subtracting the group order + // tcID: 739 + {SEC_OID_SHA256, + 739, + {0x30, 0x3d, 0x02, 0x1d, 0x01, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb, 0xd4, + 0x46, 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, 0x0a, 0x58, + 0x0e, 0x61, 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee, 0x93, + 0x02, 0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, 0xad, 0xe4, + 0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48, 0x0c, 0x38, + 0x6c, 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: Modified r or s, e.g. by adding or subtracting the group order + // tcID: 740 + {SEC_OID_SHA256, + 740, + {0x30, 0x3c, 0x02, 0x1c, 0x64, 0x90, 0x1b, 0x5e, 0x34, 0x2b, 0xb9, + 0x82, 0x8a, 0x7b, 0x51, 0xc7, 0xd5, 0x1c, 0xec, 0xf5, 0xa7, 0xf1, + 0x9e, 0x46, 0x96, 0x59, 0xf9, 0x8c, 0x8c, 0x2a, 0x11, 0x6d, 0x02, + 0x1c, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, 0xad, 0xe4, 0x14, + 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48, 0x0c, 0x38, 0x6c, + 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: Modified r or s, e.g. by adding or subtracting the group order + // tcID: 741 + {SEC_OID_SHA256, + 741, + {0x30, 0x3e, 0x02, 0x1d, 0x00, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb, 0xd4, + 0x46, 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, 0x0a, 0x58, + 0x0e, 0x61, 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee, 0x93, + 0x02, 0x1d, 0x01, 0x1a, 0xde, 0xb9, 0xed, 0x97, 0x4f, 0x87, 0x8d, + 0xc2, 0xfc, 0x26, 0xf4, 0xbf, 0x86, 0xff, 0xda, 0x5f, 0x7a, 0xbe, + 0x6c, 0x26, 0xeb, 0xab, 0xf9, 0xb8, 0x18, 0x1a, 0x73}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: Modified r or s, e.g. by adding or subtracting the group order + // tcID: 742 + {SEC_OID_SHA256, + 742, + {0x30, 0x3d, 0x02, 0x1d, 0x00, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb, 0xd4, + 0x46, 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, 0x0a, 0x58, + 0x0e, 0x61, 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee, 0x93, + 0x02, 0x1c, 0xa4, 0xf1, 0x8c, 0xa0, 0x8c, 0x5d, 0x97, 0xce, 0x05, + 0x2c, 0x32, 0x25, 0x2c, 0x97, 0x70, 0xce, 0x81, 0x15, 0x5a, 0x04, + 0xb1, 0x20, 0xaa, 0x78, 0x3e, 0x6d, 0x47, 0xb9}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: Modified r or s, e.g. by adding or subtracting the group order + // tcID: 743 + {SEC_OID_SHA256, + 743, + {0x30, 0x3d, 0x02, 0x1d, 0x00, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb, 0xd4, + 0x46, 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, 0x0a, 0x58, + 0x0e, 0x61, 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee, 0x93, + 0x02, 0x1c, 0xa0, 0x17, 0xdc, 0xb8, 0xee, 0x29, 0x70, 0x52, 0x1b, + 0xeb, 0xd3, 0x73, 0x09, 0xf0, 0xc7, 0xab, 0x8f, 0xb7, 0xf3, 0xc7, + 0x93, 0xf9, 0xd4, 0xc7, 0x04, 0xbd, 0x4e, 0xea}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: Modified r or s, e.g. by adding or subtracting the group order + // tcID: 744 + {SEC_OID_SHA256, + 744, + {0x30, 0x3d, 0x02, 0x1d, 0x00, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb, 0xd4, + 0x46, 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, 0x0a, 0x58, + 0x0e, 0x61, 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee, 0x93, + 0x02, 0x1c, 0x5b, 0x0e, 0x73, 0x5f, 0x73, 0xa2, 0x68, 0x31, 0xfa, + 0xd3, 0xcd, 0xda, 0xd3, 0x68, 0x8f, 0x31, 0x7e, 0xea, 0xa5, 0xfb, + 0x4e, 0xdf, 0x55, 0x87, 0xc1, 0x92, 0xb8, 0x47}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: Modified r or s, e.g. by adding or subtracting the group order + // tcID: 745 + {SEC_OID_SHA256, + 745, + {0x30, 0x3e, 0x02, 0x1d, 0x00, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb, 0xd4, + 0x46, 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, 0x0a, 0x58, + 0x0e, 0x61, 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee, 0x93, + 0x02, 0x1d, 0xfe, 0xe5, 0x21, 0x46, 0x12, 0x68, 0xb0, 0x78, 0x72, + 0x3d, 0x03, 0xd9, 0x0b, 0x40, 0x79, 0x00, 0x25, 0xa0, 0x85, 0x41, + 0x93, 0xd9, 0x14, 0x54, 0x06, 0x47, 0xe7, 0xe5, 0x8d}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: Modified r or s, e.g. by adding or subtracting the group order + // tcID: 746 + {SEC_OID_SHA256, + 746, + {0x30, 0x3e, 0x02, 0x1d, 0x00, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb, 0xd4, + 0x46, 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, 0x0a, 0x58, + 0x0e, 0x61, 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee, 0x93, + 0x02, 0x1d, 0x01, 0x5f, 0xe8, 0x23, 0x47, 0x11, 0xd6, 0x8f, 0xad, + 0xe4, 0x14, 0x2c, 0x8c, 0xf6, 0x0f, 0x38, 0x54, 0x70, 0x48, 0x0c, + 0x38, 0x6c, 0x06, 0x2b, 0x38, 0xfb, 0x42, 0xb1, 0x16}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: Modified r or s, e.g. by adding or subtracting the group order + // tcID: 747 + {SEC_OID_SHA256, + 747, + {0x30, 0x3e, 0x02, 0x1d, 0x00, 0x9b, 0x6f, 0xe4, 0xa1, 0xcb, 0xd4, + 0x46, 0x7d, 0x75, 0x84, 0xae, 0x38, 0x2a, 0xe3, 0x13, 0x0a, 0x58, + 0x0e, 0x61, 0xb9, 0x69, 0xa6, 0x06, 0x73, 0x73, 0xd5, 0xee, 0x93, + 0x02, 0x1d, 0x00, 0xa0, 0x17, 0xdc, 0xb8, 0xee, 0x29, 0x70, 0x52, + 0x1b, 0xeb, 0xd3, 0x73, 0x09, 0xf0, 0xc7, 0xab, 0x8f, 0xb7, 0xf3, + 0xc7, 0x93, 0xf9, 0xd4, 0xc7, 0x04, 0xbd, 0x4e, 0xea}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 748 + {SEC_OID_SHA256, + 748, + {0x30, 0x22, 0x02, 0x01, 0x00, 0x02, 0x1d, 0xff, 0x45, 0x09, 0x69, 0x59, + 0x7a, 0x87, 0x08, 0x20, 0x21, 0x18, 0x05, 0x98, 0x36, 0x88, 0x38, 0x7a, + 0x10, 0xcd, 0x4d, 0xcc, 0x45, 0x1a, 0x7f, 0x3f, 0x43, 0x2a, 0x96, 0xa3}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 749 + {SEC_OID_SHA256, + 749, + {0x30, 0x06, 0x02, 0x01, 0x00, 0x02, 0x01, 0x00}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 750 + {SEC_OID_SHA256, + 750, + {0x30, 0x06, 0x02, 0x01, 0x00, 0x02, 0x01, 0x01}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 751 + {SEC_OID_SHA256, + 751, + {0x30, 0x06, 0x02, 0x01, 0x00, 0x02, 0x01, 0xff}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 752 + {SEC_OID_SHA256, + 752, + {0x30, 0x21, 0x02, 0x01, 0x00, 0x02, 0x1c, 0x5d, 0x7b, 0x4b, 0x53, 0x42, + 0xbc, 0x7b, 0xef, 0xef, 0x73, 0xfd, 0x33, 0xe4, 0xbb, 0xe3, 0xc2, 0xf7, + 0x99, 0x59, 0x19, 0xdd, 0x72, 0xc0, 0x60, 0x5e, 0x6a, 0xb4, 0xae}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 753 + {SEC_OID_SHA256, + 753, + {0x30, 0x21, 0x02, 0x01, 0x00, 0x02, 0x1c, 0x5d, 0x7b, 0x4b, 0x53, 0x42, + 0xbc, 0x7b, 0xef, 0xef, 0x73, 0xfd, 0x33, 0xe4, 0xbb, 0xe3, 0xc2, 0xf7, + 0x99, 0x59, 0x19, 0xdd, 0x72, 0xc0, 0x60, 0x5e, 0x6a, 0xb4, 0xaf}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 754 + {SEC_OID_SHA256, + 754, + {0x30, 0x22, 0x02, 0x01, 0x00, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, + 0x85, 0x78, 0xf7, 0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, + 0xef, 0x32, 0xb2, 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5c}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 755 + {SEC_OID_SHA256, + 755, + {0x30, 0x22, 0x02, 0x01, 0x00, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, + 0x85, 0x78, 0xf7, 0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, + 0xef, 0x32, 0xb2, 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5d}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 756 + {SEC_OID_SHA256, + 756, + {0x30, 0x22, 0x02, 0x01, 0x00, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, + 0x85, 0x78, 0xf7, 0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, + 0xef, 0x32, 0xb2, 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5e}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 757 + {SEC_OID_SHA256, + 757, + {0x30, 0x22, 0x02, 0x01, 0x00, 0x02, 0x1d, 0x01, 0x00, 0x00, 0x00, 0x00, + 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, + 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 758 + {SEC_OID_SHA256, + 758, + {0x30, 0x82, 0x01, 0x08, 0x02, 0x01, 0x00, 0x02, 0x82, 0x01, 0x01, 0x00, + 0x8f, 0x79, 0x35, 0xd9, 0xb9, 0xaa, 0xe9, 0xbf, 0xab, 0xed, 0x88, 0x7a, + 0xcf, 0x49, 0x51, 0xb6, 0xf3, 0x2e, 0xc5, 0x9e, 0x3b, 0xaf, 0x37, 0x18, + 0xe8, 0xea, 0xc4, 0x96, 0x1f, 0x3e, 0xfd, 0x36, 0x06, 0xe7, 0x43, 0x51, + 0xa9, 0xc4, 0x18, 0x33, 0x39, 0xb8, 0x09, 0xe7, 0xc2, 0xae, 0x1c, 0x53, + 0x9b, 0xa7, 0x47, 0x5b, 0x85, 0xd0, 0x11, 0xad, 0xb8, 0xb4, 0x79, 0x87, + 0x75, 0x49, 0x84, 0x69, 0x5c, 0xac, 0x0e, 0x8f, 0x14, 0xb3, 0x36, 0x08, + 0x28, 0xa2, 0x2f, 0xfa, 0x27, 0x11, 0x0a, 0x3d, 0x62, 0xa9, 0x93, 0x45, + 0x34, 0x09, 0xa0, 0xfe, 0x69, 0x6c, 0x46, 0x58, 0xf8, 0x4b, 0xdd, 0x20, + 0x81, 0x9c, 0x37, 0x09, 0xa0, 0x10, 0x57, 0xb1, 0x95, 0xad, 0xcd, 0x00, + 0x23, 0x3d, 0xba, 0x54, 0x84, 0xb6, 0x29, 0x1f, 0x9d, 0x64, 0x8e, 0xf8, + 0x83, 0x44, 0x86, 0x77, 0x97, 0x9c, 0xec, 0x04, 0xb4, 0x34, 0xa6, 0xac, + 0x2e, 0x75, 0xe9, 0x98, 0x5d, 0xe2, 0x3d, 0xb0, 0x29, 0x2f, 0xc1, 0x11, + 0x8c, 0x9f, 0xfa, 0x9d, 0x81, 0x81, 0xe7, 0x33, 0x8d, 0xb7, 0x92, 0xb7, + 0x30, 0xd7, 0xb9, 0xe3, 0x49, 0x59, 0x2f, 0x68, 0x09, 0x98, 0x72, 0x15, + 0x39, 0x15, 0xea, 0x3d, 0x6b, 0x8b, 0x46, 0x53, 0xc6, 0x33, 0x45, 0x8f, + 0x80, 0x3b, 0x32, 0xa4, 0xc2, 0xe0, 0xf2, 0x72, 0x90, 0x25, 0x6e, 0x4e, + 0x3f, 0x8a, 0x3b, 0x08, 0x38, 0xa1, 0xc4, 0x50, 0xe4, 0xe1, 0x8c, 0x1a, + 0x29, 0xa3, 0x7d, 0xdf, 0x5e, 0xa1, 0x43, 0xde, 0x4b, 0x66, 0xff, 0x04, + 0x90, 0x3e, 0xd5, 0xcf, 0x16, 0x23, 0xe1, 0x58, 0xd4, 0x87, 0xc6, 0x08, + 0xe9, 0x7f, 0x21, 0x1c, 0xd8, 0x1d, 0xca, 0x23, 0xcb, 0x6e, 0x38, 0x07, + 0x65, 0xf8, 0x22, 0xe3, 0x42, 0xbe, 0x48, 0x4c, 0x05, 0x76, 0x39, 0x39, + 0x60, 0x1c, 0xd6, 0x67}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 759 + {SEC_OID_SHA256, + 759, + {0x30, 0x08, 0x02, 0x01, 0x00, 0x09, 0x03, 0x80, 0xfe, 0x01}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 760 + {SEC_OID_SHA256, + 760, + {0x30, 0x06, 0x02, 0x01, 0x00, 0x09, 0x01, 0x42}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 761 + {SEC_OID_SHA256, + 761, + {0x30, 0x22, 0x02, 0x01, 0x01, 0x02, 0x1d, 0xff, 0x45, 0x09, 0x69, 0x59, + 0x7a, 0x87, 0x08, 0x20, 0x21, 0x18, 0x05, 0x98, 0x36, 0x88, 0x38, 0x7a, + 0x10, 0xcd, 0x4d, 0xcc, 0x45, 0x1a, 0x7f, 0x3f, 0x43, 0x2a, 0x96, 0xa3}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 762 + {SEC_OID_SHA256, + 762, + {0x30, 0x06, 0x02, 0x01, 0x01, 0x02, 0x01, 0x00}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 763 + {SEC_OID_SHA256, + 763, + {0x30, 0x06, 0x02, 0x01, 0x01, 0x02, 0x01, 0x01}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 764 + {SEC_OID_SHA256, + 764, + {0x30, 0x06, 0x02, 0x01, 0x01, 0x02, 0x01, 0xff}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 765 + {SEC_OID_SHA256, + 765, + {0x30, 0x21, 0x02, 0x01, 0x01, 0x02, 0x1c, 0x5d, 0x7b, 0x4b, 0x53, 0x42, + 0xbc, 0x7b, 0xef, 0xef, 0x73, 0xfd, 0x33, 0xe4, 0xbb, 0xe3, 0xc2, 0xf7, + 0x99, 0x59, 0x19, 0xdd, 0x72, 0xc0, 0x60, 0x5e, 0x6a, 0xb4, 0xae}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 766 + {SEC_OID_SHA256, + 766, + {0x30, 0x21, 0x02, 0x01, 0x01, 0x02, 0x1c, 0x5d, 0x7b, 0x4b, 0x53, 0x42, + 0xbc, 0x7b, 0xef, 0xef, 0x73, 0xfd, 0x33, 0xe4, 0xbb, 0xe3, 0xc2, 0xf7, + 0x99, 0x59, 0x19, 0xdd, 0x72, 0xc0, 0x60, 0x5e, 0x6a, 0xb4, 0xaf}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 767 + {SEC_OID_SHA256, + 767, + {0x30, 0x22, 0x02, 0x01, 0x01, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, + 0x85, 0x78, 0xf7, 0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, + 0xef, 0x32, 0xb2, 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5c}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 768 + {SEC_OID_SHA256, + 768, + {0x30, 0x22, 0x02, 0x01, 0x01, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, + 0x85, 0x78, 0xf7, 0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, + 0xef, 0x32, 0xb2, 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5d}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 769 + {SEC_OID_SHA256, + 769, + {0x30, 0x22, 0x02, 0x01, 0x01, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, + 0x85, 0x78, 0xf7, 0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, + 0xef, 0x32, 0xb2, 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5e}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 770 + {SEC_OID_SHA256, + 770, + {0x30, 0x22, 0x02, 0x01, 0x01, 0x02, 0x1d, 0x01, 0x00, 0x00, 0x00, 0x00, + 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, + 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 771 + {SEC_OID_SHA256, + 771, + {0x30, 0x82, 0x01, 0x08, 0x02, 0x01, 0x01, 0x02, 0x82, 0x01, 0x01, 0x00, + 0x8f, 0x79, 0x35, 0xd9, 0xb9, 0xaa, 0xe9, 0xbf, 0xab, 0xed, 0x88, 0x7a, + 0xcf, 0x49, 0x51, 0xb6, 0xf3, 0x2e, 0xc5, 0x9e, 0x3b, 0xaf, 0x37, 0x18, + 0xe8, 0xea, 0xc4, 0x96, 0x1f, 0x3e, 0xfd, 0x36, 0x06, 0xe7, 0x43, 0x51, + 0xa9, 0xc4, 0x18, 0x33, 0x39, 0xb8, 0x09, 0xe7, 0xc2, 0xae, 0x1c, 0x53, + 0x9b, 0xa7, 0x47, 0x5b, 0x85, 0xd0, 0x11, 0xad, 0xb8, 0xb4, 0x79, 0x87, + 0x75, 0x49, 0x84, 0x69, 0x5c, 0xac, 0x0e, 0x8f, 0x14, 0xb3, 0x36, 0x08, + 0x28, 0xa2, 0x2f, 0xfa, 0x27, 0x11, 0x0a, 0x3d, 0x62, 0xa9, 0x93, 0x45, + 0x34, 0x09, 0xa0, 0xfe, 0x69, 0x6c, 0x46, 0x58, 0xf8, 0x4b, 0xdd, 0x20, + 0x81, 0x9c, 0x37, 0x09, 0xa0, 0x10, 0x57, 0xb1, 0x95, 0xad, 0xcd, 0x00, + 0x23, 0x3d, 0xba, 0x54, 0x84, 0xb6, 0x29, 0x1f, 0x9d, 0x64, 0x8e, 0xf8, + 0x83, 0x44, 0x86, 0x77, 0x97, 0x9c, 0xec, 0x04, 0xb4, 0x34, 0xa6, 0xac, + 0x2e, 0x75, 0xe9, 0x98, 0x5d, 0xe2, 0x3d, 0xb0, 0x29, 0x2f, 0xc1, 0x11, + 0x8c, 0x9f, 0xfa, 0x9d, 0x81, 0x81, 0xe7, 0x33, 0x8d, 0xb7, 0x92, 0xb7, + 0x30, 0xd7, 0xb9, 0xe3, 0x49, 0x59, 0x2f, 0x68, 0x09, 0x98, 0x72, 0x15, + 0x39, 0x15, 0xea, 0x3d, 0x6b, 0x8b, 0x46, 0x53, 0xc6, 0x33, 0x45, 0x8f, + 0x80, 0x3b, 0x32, 0xa4, 0xc2, 0xe0, 0xf2, 0x72, 0x90, 0x25, 0x6e, 0x4e, + 0x3f, 0x8a, 0x3b, 0x08, 0x38, 0xa1, 0xc4, 0x50, 0xe4, 0xe1, 0x8c, 0x1a, + 0x29, 0xa3, 0x7d, 0xdf, 0x5e, 0xa1, 0x43, 0xde, 0x4b, 0x66, 0xff, 0x04, + 0x90, 0x3e, 0xd5, 0xcf, 0x16, 0x23, 0xe1, 0x58, 0xd4, 0x87, 0xc6, 0x08, + 0xe9, 0x7f, 0x21, 0x1c, 0xd8, 0x1d, 0xca, 0x23, 0xcb, 0x6e, 0x38, 0x07, + 0x65, 0xf8, 0x22, 0xe3, 0x42, 0xbe, 0x48, 0x4c, 0x05, 0x76, 0x39, 0x39, + 0x60, 0x1c, 0xd6, 0x67}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 772 + {SEC_OID_SHA256, + 772, + {0x30, 0x08, 0x02, 0x01, 0x01, 0x09, 0x03, 0x80, 0xfe, 0x01}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 773 + {SEC_OID_SHA256, + 773, + {0x30, 0x06, 0x02, 0x01, 0x01, 0x09, 0x01, 0x42}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 774 + {SEC_OID_SHA256, + 774, + {0x30, 0x22, 0x02, 0x01, 0xff, 0x02, 0x1d, 0xff, 0x45, 0x09, 0x69, 0x59, + 0x7a, 0x87, 0x08, 0x20, 0x21, 0x18, 0x05, 0x98, 0x36, 0x88, 0x38, 0x7a, + 0x10, 0xcd, 0x4d, 0xcc, 0x45, 0x1a, 0x7f, 0x3f, 0x43, 0x2a, 0x96, 0xa3}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 775 + {SEC_OID_SHA256, + 775, + {0x30, 0x06, 0x02, 0x01, 0xff, 0x02, 0x01, 0x00}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 776 + {SEC_OID_SHA256, + 776, + {0x30, 0x06, 0x02, 0x01, 0xff, 0x02, 0x01, 0x01}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 777 + {SEC_OID_SHA256, + 777, + {0x30, 0x06, 0x02, 0x01, 0xff, 0x02, 0x01, 0xff}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 778 + {SEC_OID_SHA256, + 778, + {0x30, 0x21, 0x02, 0x01, 0xff, 0x02, 0x1c, 0x5d, 0x7b, 0x4b, 0x53, 0x42, + 0xbc, 0x7b, 0xef, 0xef, 0x73, 0xfd, 0x33, 0xe4, 0xbb, 0xe3, 0xc2, 0xf7, + 0x99, 0x59, 0x19, 0xdd, 0x72, 0xc0, 0x60, 0x5e, 0x6a, 0xb4, 0xae}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 779 + {SEC_OID_SHA256, + 779, + {0x30, 0x21, 0x02, 0x01, 0xff, 0x02, 0x1c, 0x5d, 0x7b, 0x4b, 0x53, 0x42, + 0xbc, 0x7b, 0xef, 0xef, 0x73, 0xfd, 0x33, 0xe4, 0xbb, 0xe3, 0xc2, 0xf7, + 0x99, 0x59, 0x19, 0xdd, 0x72, 0xc0, 0x60, 0x5e, 0x6a, 0xb4, 0xaf}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 780 + {SEC_OID_SHA256, + 780, + {0x30, 0x22, 0x02, 0x01, 0xff, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, + 0x85, 0x78, 0xf7, 0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, + 0xef, 0x32, 0xb2, 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5c}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 781 + {SEC_OID_SHA256, + 781, + {0x30, 0x22, 0x02, 0x01, 0xff, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, + 0x85, 0x78, 0xf7, 0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, + 0xef, 0x32, 0xb2, 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5d}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 782 + {SEC_OID_SHA256, + 782, + {0x30, 0x22, 0x02, 0x01, 0xff, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, + 0x85, 0x78, 0xf7, 0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, + 0xef, 0x32, 0xb2, 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5e}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 783 + {SEC_OID_SHA256, + 783, + {0x30, 0x22, 0x02, 0x01, 0xff, 0x02, 0x1d, 0x01, 0x00, 0x00, 0x00, 0x00, + 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, + 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 784 + {SEC_OID_SHA256, + 784, + {0x30, 0x82, 0x01, 0x08, 0x02, 0x01, 0xff, 0x02, 0x82, 0x01, 0x01, 0x00, + 0x8f, 0x79, 0x35, 0xd9, 0xb9, 0xaa, 0xe9, 0xbf, 0xab, 0xed, 0x88, 0x7a, + 0xcf, 0x49, 0x51, 0xb6, 0xf3, 0x2e, 0xc5, 0x9e, 0x3b, 0xaf, 0x37, 0x18, + 0xe8, 0xea, 0xc4, 0x96, 0x1f, 0x3e, 0xfd, 0x36, 0x06, 0xe7, 0x43, 0x51, + 0xa9, 0xc4, 0x18, 0x33, 0x39, 0xb8, 0x09, 0xe7, 0xc2, 0xae, 0x1c, 0x53, + 0x9b, 0xa7, 0x47, 0x5b, 0x85, 0xd0, 0x11, 0xad, 0xb8, 0xb4, 0x79, 0x87, + 0x75, 0x49, 0x84, 0x69, 0x5c, 0xac, 0x0e, 0x8f, 0x14, 0xb3, 0x36, 0x08, + 0x28, 0xa2, 0x2f, 0xfa, 0x27, 0x11, 0x0a, 0x3d, 0x62, 0xa9, 0x93, 0x45, + 0x34, 0x09, 0xa0, 0xfe, 0x69, 0x6c, 0x46, 0x58, 0xf8, 0x4b, 0xdd, 0x20, + 0x81, 0x9c, 0x37, 0x09, 0xa0, 0x10, 0x57, 0xb1, 0x95, 0xad, 0xcd, 0x00, + 0x23, 0x3d, 0xba, 0x54, 0x84, 0xb6, 0x29, 0x1f, 0x9d, 0x64, 0x8e, 0xf8, + 0x83, 0x44, 0x86, 0x77, 0x97, 0x9c, 0xec, 0x04, 0xb4, 0x34, 0xa6, 0xac, + 0x2e, 0x75, 0xe9, 0x98, 0x5d, 0xe2, 0x3d, 0xb0, 0x29, 0x2f, 0xc1, 0x11, + 0x8c, 0x9f, 0xfa, 0x9d, 0x81, 0x81, 0xe7, 0x33, 0x8d, 0xb7, 0x92, 0xb7, + 0x30, 0xd7, 0xb9, 0xe3, 0x49, 0x59, 0x2f, 0x68, 0x09, 0x98, 0x72, 0x15, + 0x39, 0x15, 0xea, 0x3d, 0x6b, 0x8b, 0x46, 0x53, 0xc6, 0x33, 0x45, 0x8f, + 0x80, 0x3b, 0x32, 0xa4, 0xc2, 0xe0, 0xf2, 0x72, 0x90, 0x25, 0x6e, 0x4e, + 0x3f, 0x8a, 0x3b, 0x08, 0x38, 0xa1, 0xc4, 0x50, 0xe4, 0xe1, 0x8c, 0x1a, + 0x29, 0xa3, 0x7d, 0xdf, 0x5e, 0xa1, 0x43, 0xde, 0x4b, 0x66, 0xff, 0x04, + 0x90, 0x3e, 0xd5, 0xcf, 0x16, 0x23, 0xe1, 0x58, 0xd4, 0x87, 0xc6, 0x08, + 0xe9, 0x7f, 0x21, 0x1c, 0xd8, 0x1d, 0xca, 0x23, 0xcb, 0x6e, 0x38, 0x07, + 0x65, 0xf8, 0x22, 0xe3, 0x42, 0xbe, 0x48, 0x4c, 0x05, 0x76, 0x39, 0x39, + 0x60, 0x1c, 0xd6, 0x67}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 785 + {SEC_OID_SHA256, + 785, + {0x30, 0x08, 0x02, 0x01, 0xff, 0x09, 0x03, 0x80, 0xfe, 0x01}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 786 + {SEC_OID_SHA256, + 786, + {0x30, 0x06, 0x02, 0x01, 0xff, 0x09, 0x01, 0x42}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 787 + {SEC_OID_SHA256, + 787, + {0x30, 0x3d, 0x02, 0x1c, 0x5d, 0x7b, 0x4b, 0x53, 0x42, 0xbc, 0x7b, + 0xef, 0xef, 0x73, 0xfd, 0x33, 0xe4, 0xbb, 0xe3, 0xc2, 0xf7, 0x99, + 0x59, 0x19, 0xdd, 0x72, 0xc0, 0x60, 0x5e, 0x6a, 0xb4, 0xae, 0x02, + 0x1d, 0xff, 0x45, 0x09, 0x69, 0x59, 0x7a, 0x87, 0x08, 0x20, 0x21, + 0x18, 0x05, 0x98, 0x36, 0x88, 0x38, 0x7a, 0x10, 0xcd, 0x4d, 0xcc, + 0x45, 0x1a, 0x7f, 0x3f, 0x43, 0x2a, 0x96, 0xa3}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 788 + {SEC_OID_SHA256, + 788, + {0x30, 0x21, 0x02, 0x1c, 0x5d, 0x7b, 0x4b, 0x53, 0x42, 0xbc, 0x7b, 0xef, + 0xef, 0x73, 0xfd, 0x33, 0xe4, 0xbb, 0xe3, 0xc2, 0xf7, 0x99, 0x59, 0x19, + 0xdd, 0x72, 0xc0, 0x60, 0x5e, 0x6a, 0xb4, 0xae, 0x02, 0x01, 0x00}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 789 + {SEC_OID_SHA256, + 789, + {0x30, 0x21, 0x02, 0x1c, 0x5d, 0x7b, 0x4b, 0x53, 0x42, 0xbc, 0x7b, 0xef, + 0xef, 0x73, 0xfd, 0x33, 0xe4, 0xbb, 0xe3, 0xc2, 0xf7, 0x99, 0x59, 0x19, + 0xdd, 0x72, 0xc0, 0x60, 0x5e, 0x6a, 0xb4, 0xae, 0x02, 0x01, 0x01}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 790 + {SEC_OID_SHA256, + 790, + {0x30, 0x21, 0x02, 0x1c, 0x5d, 0x7b, 0x4b, 0x53, 0x42, 0xbc, 0x7b, 0xef, + 0xef, 0x73, 0xfd, 0x33, 0xe4, 0xbb, 0xe3, 0xc2, 0xf7, 0x99, 0x59, 0x19, + 0xdd, 0x72, 0xc0, 0x60, 0x5e, 0x6a, 0xb4, 0xae, 0x02, 0x01, 0xff}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 791 + {SEC_OID_SHA256, + 791, + {0x30, 0x3c, 0x02, 0x1c, 0x5d, 0x7b, 0x4b, 0x53, 0x42, 0xbc, 0x7b, + 0xef, 0xef, 0x73, 0xfd, 0x33, 0xe4, 0xbb, 0xe3, 0xc2, 0xf7, 0x99, + 0x59, 0x19, 0xdd, 0x72, 0xc0, 0x60, 0x5e, 0x6a, 0xb4, 0xae, 0x02, + 0x1c, 0x5d, 0x7b, 0x4b, 0x53, 0x42, 0xbc, 0x7b, 0xef, 0xef, 0x73, + 0xfd, 0x33, 0xe4, 0xbb, 0xe3, 0xc2, 0xf7, 0x99, 0x59, 0x19, 0xdd, + 0x72, 0xc0, 0x60, 0x5e, 0x6a, 0xb4, 0xae}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 792 + {SEC_OID_SHA256, + 792, + {0x30, 0x3c, 0x02, 0x1c, 0x5d, 0x7b, 0x4b, 0x53, 0x42, 0xbc, 0x7b, + 0xef, 0xef, 0x73, 0xfd, 0x33, 0xe4, 0xbb, 0xe3, 0xc2, 0xf7, 0x99, + 0x59, 0x19, 0xdd, 0x72, 0xc0, 0x60, 0x5e, 0x6a, 0xb4, 0xae, 0x02, + 0x1c, 0x5d, 0x7b, 0x4b, 0x53, 0x42, 0xbc, 0x7b, 0xef, 0xef, 0x73, + 0xfd, 0x33, 0xe4, 0xbb, 0xe3, 0xc2, 0xf7, 0x99, 0x59, 0x19, 0xdd, + 0x72, 0xc0, 0x60, 0x5e, 0x6a, 0xb4, 0xaf}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 793 + {SEC_OID_SHA256, + 793, + {0x30, 0x3d, 0x02, 0x1c, 0x5d, 0x7b, 0x4b, 0x53, 0x42, 0xbc, 0x7b, + 0xef, 0xef, 0x73, 0xfd, 0x33, 0xe4, 0xbb, 0xe3, 0xc2, 0xf7, 0x99, + 0x59, 0x19, 0xdd, 0x72, 0xc0, 0x60, 0x5e, 0x6a, 0xb4, 0xae, 0x02, + 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78, 0xf7, 0xdf, 0xde, + 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef, 0x32, 0xb2, 0x33, + 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5c}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 794 + {SEC_OID_SHA256, + 794, + {0x30, 0x3d, 0x02, 0x1c, 0x5d, 0x7b, 0x4b, 0x53, 0x42, 0xbc, 0x7b, + 0xef, 0xef, 0x73, 0xfd, 0x33, 0xe4, 0xbb, 0xe3, 0xc2, 0xf7, 0x99, + 0x59, 0x19, 0xdd, 0x72, 0xc0, 0x60, 0x5e, 0x6a, 0xb4, 0xae, 0x02, + 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78, 0xf7, 0xdf, 0xde, + 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef, 0x32, 0xb2, 0x33, + 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5d}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 795 + {SEC_OID_SHA256, + 795, + {0x30, 0x3d, 0x02, 0x1c, 0x5d, 0x7b, 0x4b, 0x53, 0x42, 0xbc, 0x7b, + 0xef, 0xef, 0x73, 0xfd, 0x33, 0xe4, 0xbb, 0xe3, 0xc2, 0xf7, 0x99, + 0x59, 0x19, 0xdd, 0x72, 0xc0, 0x60, 0x5e, 0x6a, 0xb4, 0xae, 0x02, + 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78, 0xf7, 0xdf, 0xde, + 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef, 0x32, 0xb2, 0x33, + 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5e}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 796 + {SEC_OID_SHA256, + 796, + {0x30, 0x3d, 0x02, 0x1c, 0x5d, 0x7b, 0x4b, 0x53, 0x42, 0xbc, 0x7b, + 0xef, 0xef, 0x73, 0xfd, 0x33, 0xe4, 0xbb, 0xe3, 0xc2, 0xf7, 0x99, + 0x59, 0x19, 0xdd, 0x72, 0xc0, 0x60, 0x5e, 0x6a, 0xb4, 0xae, 0x02, + 0x1d, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, + 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, + 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 797 + {SEC_OID_SHA256, + 797, + {0x30, 0x82, 0x01, 0x23, 0x02, 0x1c, 0x5d, 0x7b, 0x4b, 0x53, 0x42, 0xbc, + 0x7b, 0xef, 0xef, 0x73, 0xfd, 0x33, 0xe4, 0xbb, 0xe3, 0xc2, 0xf7, 0x99, + 0x59, 0x19, 0xdd, 0x72, 0xc0, 0x60, 0x5e, 0x6a, 0xb4, 0xae, 0x02, 0x82, + 0x01, 0x01, 0x00, 0x8f, 0x79, 0x35, 0xd9, 0xb9, 0xaa, 0xe9, 0xbf, 0xab, + 0xed, 0x88, 0x7a, 0xcf, 0x49, 0x51, 0xb6, 0xf3, 0x2e, 0xc5, 0x9e, 0x3b, + 0xaf, 0x37, 0x18, 0xe8, 0xea, 0xc4, 0x96, 0x1f, 0x3e, 0xfd, 0x36, 0x06, + 0xe7, 0x43, 0x51, 0xa9, 0xc4, 0x18, 0x33, 0x39, 0xb8, 0x09, 0xe7, 0xc2, + 0xae, 0x1c, 0x53, 0x9b, 0xa7, 0x47, 0x5b, 0x85, 0xd0, 0x11, 0xad, 0xb8, + 0xb4, 0x79, 0x87, 0x75, 0x49, 0x84, 0x69, 0x5c, 0xac, 0x0e, 0x8f, 0x14, + 0xb3, 0x36, 0x08, 0x28, 0xa2, 0x2f, 0xfa, 0x27, 0x11, 0x0a, 0x3d, 0x62, + 0xa9, 0x93, 0x45, 0x34, 0x09, 0xa0, 0xfe, 0x69, 0x6c, 0x46, 0x58, 0xf8, + 0x4b, 0xdd, 0x20, 0x81, 0x9c, 0x37, 0x09, 0xa0, 0x10, 0x57, 0xb1, 0x95, + 0xad, 0xcd, 0x00, 0x23, 0x3d, 0xba, 0x54, 0x84, 0xb6, 0x29, 0x1f, 0x9d, + 0x64, 0x8e, 0xf8, 0x83, 0x44, 0x86, 0x77, 0x97, 0x9c, 0xec, 0x04, 0xb4, + 0x34, 0xa6, 0xac, 0x2e, 0x75, 0xe9, 0x98, 0x5d, 0xe2, 0x3d, 0xb0, 0x29, + 0x2f, 0xc1, 0x11, 0x8c, 0x9f, 0xfa, 0x9d, 0x81, 0x81, 0xe7, 0x33, 0x8d, + 0xb7, 0x92, 0xb7, 0x30, 0xd7, 0xb9, 0xe3, 0x49, 0x59, 0x2f, 0x68, 0x09, + 0x98, 0x72, 0x15, 0x39, 0x15, 0xea, 0x3d, 0x6b, 0x8b, 0x46, 0x53, 0xc6, + 0x33, 0x45, 0x8f, 0x80, 0x3b, 0x32, 0xa4, 0xc2, 0xe0, 0xf2, 0x72, 0x90, + 0x25, 0x6e, 0x4e, 0x3f, 0x8a, 0x3b, 0x08, 0x38, 0xa1, 0xc4, 0x50, 0xe4, + 0xe1, 0x8c, 0x1a, 0x29, 0xa3, 0x7d, 0xdf, 0x5e, 0xa1, 0x43, 0xde, 0x4b, + 0x66, 0xff, 0x04, 0x90, 0x3e, 0xd5, 0xcf, 0x16, 0x23, 0xe1, 0x58, 0xd4, + 0x87, 0xc6, 0x08, 0xe9, 0x7f, 0x21, 0x1c, 0xd8, 0x1d, 0xca, 0x23, 0xcb, + 0x6e, 0x38, 0x07, 0x65, 0xf8, 0x22, 0xe3, 0x42, 0xbe, 0x48, 0x4c, 0x05, + 0x76, 0x39, 0x39, 0x60, 0x1c, 0xd6, 0x67}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 798 + {SEC_OID_SHA256, + 798, + {0x30, 0x23, 0x02, 0x1c, 0x5d, 0x7b, 0x4b, 0x53, 0x42, 0xbc, + 0x7b, 0xef, 0xef, 0x73, 0xfd, 0x33, 0xe4, 0xbb, 0xe3, 0xc2, + 0xf7, 0x99, 0x59, 0x19, 0xdd, 0x72, 0xc0, 0x60, 0x5e, 0x6a, + 0xb4, 0xae, 0x09, 0x03, 0x80, 0xfe, 0x01}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 799 + {SEC_OID_SHA256, + 799, + {0x30, 0x21, 0x02, 0x1c, 0x5d, 0x7b, 0x4b, 0x53, 0x42, 0xbc, 0x7b, 0xef, + 0xef, 0x73, 0xfd, 0x33, 0xe4, 0xbb, 0xe3, 0xc2, 0xf7, 0x99, 0x59, 0x19, + 0xdd, 0x72, 0xc0, 0x60, 0x5e, 0x6a, 0xb4, 0xae, 0x09, 0x01, 0x42}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 800 + {SEC_OID_SHA256, + 800, + {0x30, 0x3d, 0x02, 0x1c, 0x5d, 0x7b, 0x4b, 0x53, 0x42, 0xbc, 0x7b, + 0xef, 0xef, 0x73, 0xfd, 0x33, 0xe4, 0xbb, 0xe3, 0xc2, 0xf7, 0x99, + 0x59, 0x19, 0xdd, 0x72, 0xc0, 0x60, 0x5e, 0x6a, 0xb4, 0xaf, 0x02, + 0x1d, 0xff, 0x45, 0x09, 0x69, 0x59, 0x7a, 0x87, 0x08, 0x20, 0x21, + 0x18, 0x05, 0x98, 0x36, 0x88, 0x38, 0x7a, 0x10, 0xcd, 0x4d, 0xcc, + 0x45, 0x1a, 0x7f, 0x3f, 0x43, 0x2a, 0x96, 0xa3}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 801 + {SEC_OID_SHA256, + 801, + {0x30, 0x21, 0x02, 0x1c, 0x5d, 0x7b, 0x4b, 0x53, 0x42, 0xbc, 0x7b, 0xef, + 0xef, 0x73, 0xfd, 0x33, 0xe4, 0xbb, 0xe3, 0xc2, 0xf7, 0x99, 0x59, 0x19, + 0xdd, 0x72, 0xc0, 0x60, 0x5e, 0x6a, 0xb4, 0xaf, 0x02, 0x01, 0x00}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 802 + {SEC_OID_SHA256, + 802, + {0x30, 0x21, 0x02, 0x1c, 0x5d, 0x7b, 0x4b, 0x53, 0x42, 0xbc, 0x7b, 0xef, + 0xef, 0x73, 0xfd, 0x33, 0xe4, 0xbb, 0xe3, 0xc2, 0xf7, 0x99, 0x59, 0x19, + 0xdd, 0x72, 0xc0, 0x60, 0x5e, 0x6a, 0xb4, 0xaf, 0x02, 0x01, 0x01}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 803 + {SEC_OID_SHA256, + 803, + {0x30, 0x21, 0x02, 0x1c, 0x5d, 0x7b, 0x4b, 0x53, 0x42, 0xbc, 0x7b, 0xef, + 0xef, 0x73, 0xfd, 0x33, 0xe4, 0xbb, 0xe3, 0xc2, 0xf7, 0x99, 0x59, 0x19, + 0xdd, 0x72, 0xc0, 0x60, 0x5e, 0x6a, 0xb4, 0xaf, 0x02, 0x01, 0xff}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 804 + {SEC_OID_SHA256, + 804, + {0x30, 0x3c, 0x02, 0x1c, 0x5d, 0x7b, 0x4b, 0x53, 0x42, 0xbc, 0x7b, + 0xef, 0xef, 0x73, 0xfd, 0x33, 0xe4, 0xbb, 0xe3, 0xc2, 0xf7, 0x99, + 0x59, 0x19, 0xdd, 0x72, 0xc0, 0x60, 0x5e, 0x6a, 0xb4, 0xaf, 0x02, + 0x1c, 0x5d, 0x7b, 0x4b, 0x53, 0x42, 0xbc, 0x7b, 0xef, 0xef, 0x73, + 0xfd, 0x33, 0xe4, 0xbb, 0xe3, 0xc2, 0xf7, 0x99, 0x59, 0x19, 0xdd, + 0x72, 0xc0, 0x60, 0x5e, 0x6a, 0xb4, 0xae}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 805 + {SEC_OID_SHA256, + 805, + {0x30, 0x3c, 0x02, 0x1c, 0x5d, 0x7b, 0x4b, 0x53, 0x42, 0xbc, 0x7b, + 0xef, 0xef, 0x73, 0xfd, 0x33, 0xe4, 0xbb, 0xe3, 0xc2, 0xf7, 0x99, + 0x59, 0x19, 0xdd, 0x72, 0xc0, 0x60, 0x5e, 0x6a, 0xb4, 0xaf, 0x02, + 0x1c, 0x5d, 0x7b, 0x4b, 0x53, 0x42, 0xbc, 0x7b, 0xef, 0xef, 0x73, + 0xfd, 0x33, 0xe4, 0xbb, 0xe3, 0xc2, 0xf7, 0x99, 0x59, 0x19, 0xdd, + 0x72, 0xc0, 0x60, 0x5e, 0x6a, 0xb4, 0xaf}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 806 + {SEC_OID_SHA256, + 806, + {0x30, 0x3d, 0x02, 0x1c, 0x5d, 0x7b, 0x4b, 0x53, 0x42, 0xbc, 0x7b, + 0xef, 0xef, 0x73, 0xfd, 0x33, 0xe4, 0xbb, 0xe3, 0xc2, 0xf7, 0x99, + 0x59, 0x19, 0xdd, 0x72, 0xc0, 0x60, 0x5e, 0x6a, 0xb4, 0xaf, 0x02, + 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78, 0xf7, 0xdf, 0xde, + 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef, 0x32, 0xb2, 0x33, + 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5c}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 807 + {SEC_OID_SHA256, + 807, + {0x30, 0x3d, 0x02, 0x1c, 0x5d, 0x7b, 0x4b, 0x53, 0x42, 0xbc, 0x7b, + 0xef, 0xef, 0x73, 0xfd, 0x33, 0xe4, 0xbb, 0xe3, 0xc2, 0xf7, 0x99, + 0x59, 0x19, 0xdd, 0x72, 0xc0, 0x60, 0x5e, 0x6a, 0xb4, 0xaf, 0x02, + 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78, 0xf7, 0xdf, 0xde, + 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef, 0x32, 0xb2, 0x33, + 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5d}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 808 + {SEC_OID_SHA256, + 808, + {0x30, 0x3d, 0x02, 0x1c, 0x5d, 0x7b, 0x4b, 0x53, 0x42, 0xbc, 0x7b, + 0xef, 0xef, 0x73, 0xfd, 0x33, 0xe4, 0xbb, 0xe3, 0xc2, 0xf7, 0x99, + 0x59, 0x19, 0xdd, 0x72, 0xc0, 0x60, 0x5e, 0x6a, 0xb4, 0xaf, 0x02, + 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78, 0xf7, 0xdf, 0xde, + 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef, 0x32, 0xb2, 0x33, + 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5e}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 809 + {SEC_OID_SHA256, + 809, + {0x30, 0x3d, 0x02, 0x1c, 0x5d, 0x7b, 0x4b, 0x53, 0x42, 0xbc, 0x7b, + 0xef, 0xef, 0x73, 0xfd, 0x33, 0xe4, 0xbb, 0xe3, 0xc2, 0xf7, 0x99, + 0x59, 0x19, 0xdd, 0x72, 0xc0, 0x60, 0x5e, 0x6a, 0xb4, 0xaf, 0x02, + 0x1d, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, + 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, + 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 810 + {SEC_OID_SHA256, + 810, + {0x30, 0x82, 0x01, 0x23, 0x02, 0x1c, 0x5d, 0x7b, 0x4b, 0x53, 0x42, 0xbc, + 0x7b, 0xef, 0xef, 0x73, 0xfd, 0x33, 0xe4, 0xbb, 0xe3, 0xc2, 0xf7, 0x99, + 0x59, 0x19, 0xdd, 0x72, 0xc0, 0x60, 0x5e, 0x6a, 0xb4, 0xaf, 0x02, 0x82, + 0x01, 0x01, 0x00, 0x8f, 0x79, 0x35, 0xd9, 0xb9, 0xaa, 0xe9, 0xbf, 0xab, + 0xed, 0x88, 0x7a, 0xcf, 0x49, 0x51, 0xb6, 0xf3, 0x2e, 0xc5, 0x9e, 0x3b, + 0xaf, 0x37, 0x18, 0xe8, 0xea, 0xc4, 0x96, 0x1f, 0x3e, 0xfd, 0x36, 0x06, + 0xe7, 0x43, 0x51, 0xa9, 0xc4, 0x18, 0x33, 0x39, 0xb8, 0x09, 0xe7, 0xc2, + 0xae, 0x1c, 0x53, 0x9b, 0xa7, 0x47, 0x5b, 0x85, 0xd0, 0x11, 0xad, 0xb8, + 0xb4, 0x79, 0x87, 0x75, 0x49, 0x84, 0x69, 0x5c, 0xac, 0x0e, 0x8f, 0x14, + 0xb3, 0x36, 0x08, 0x28, 0xa2, 0x2f, 0xfa, 0x27, 0x11, 0x0a, 0x3d, 0x62, + 0xa9, 0x93, 0x45, 0x34, 0x09, 0xa0, 0xfe, 0x69, 0x6c, 0x46, 0x58, 0xf8, + 0x4b, 0xdd, 0x20, 0x81, 0x9c, 0x37, 0x09, 0xa0, 0x10, 0x57, 0xb1, 0x95, + 0xad, 0xcd, 0x00, 0x23, 0x3d, 0xba, 0x54, 0x84, 0xb6, 0x29, 0x1f, 0x9d, + 0x64, 0x8e, 0xf8, 0x83, 0x44, 0x86, 0x77, 0x97, 0x9c, 0xec, 0x04, 0xb4, + 0x34, 0xa6, 0xac, 0x2e, 0x75, 0xe9, 0x98, 0x5d, 0xe2, 0x3d, 0xb0, 0x29, + 0x2f, 0xc1, 0x11, 0x8c, 0x9f, 0xfa, 0x9d, 0x81, 0x81, 0xe7, 0x33, 0x8d, + 0xb7, 0x92, 0xb7, 0x30, 0xd7, 0xb9, 0xe3, 0x49, 0x59, 0x2f, 0x68, 0x09, + 0x98, 0x72, 0x15, 0x39, 0x15, 0xea, 0x3d, 0x6b, 0x8b, 0x46, 0x53, 0xc6, + 0x33, 0x45, 0x8f, 0x80, 0x3b, 0x32, 0xa4, 0xc2, 0xe0, 0xf2, 0x72, 0x90, + 0x25, 0x6e, 0x4e, 0x3f, 0x8a, 0x3b, 0x08, 0x38, 0xa1, 0xc4, 0x50, 0xe4, + 0xe1, 0x8c, 0x1a, 0x29, 0xa3, 0x7d, 0xdf, 0x5e, 0xa1, 0x43, 0xde, 0x4b, + 0x66, 0xff, 0x04, 0x90, 0x3e, 0xd5, 0xcf, 0x16, 0x23, 0xe1, 0x58, 0xd4, + 0x87, 0xc6, 0x08, 0xe9, 0x7f, 0x21, 0x1c, 0xd8, 0x1d, 0xca, 0x23, 0xcb, + 0x6e, 0x38, 0x07, 0x65, 0xf8, 0x22, 0xe3, 0x42, 0xbe, 0x48, 0x4c, 0x05, + 0x76, 0x39, 0x39, 0x60, 0x1c, 0xd6, 0x67}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 811 + {SEC_OID_SHA256, + 811, + {0x30, 0x23, 0x02, 0x1c, 0x5d, 0x7b, 0x4b, 0x53, 0x42, 0xbc, + 0x7b, 0xef, 0xef, 0x73, 0xfd, 0x33, 0xe4, 0xbb, 0xe3, 0xc2, + 0xf7, 0x99, 0x59, 0x19, 0xdd, 0x72, 0xc0, 0x60, 0x5e, 0x6a, + 0xb4, 0xaf, 0x09, 0x03, 0x80, 0xfe, 0x01}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 812 + {SEC_OID_SHA256, + 812, + {0x30, 0x21, 0x02, 0x1c, 0x5d, 0x7b, 0x4b, 0x53, 0x42, 0xbc, 0x7b, 0xef, + 0xef, 0x73, 0xfd, 0x33, 0xe4, 0xbb, 0xe3, 0xc2, 0xf7, 0x99, 0x59, 0x19, + 0xdd, 0x72, 0xc0, 0x60, 0x5e, 0x6a, 0xb4, 0xaf, 0x09, 0x01, 0x42}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 813 + {SEC_OID_SHA256, + 813, + {0x30, 0x3e, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78, + 0xf7, 0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef, + 0x32, 0xb2, 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5c, + 0x02, 0x1d, 0xff, 0x45, 0x09, 0x69, 0x59, 0x7a, 0x87, 0x08, 0x20, + 0x21, 0x18, 0x05, 0x98, 0x36, 0x88, 0x38, 0x7a, 0x10, 0xcd, 0x4d, + 0xcc, 0x45, 0x1a, 0x7f, 0x3f, 0x43, 0x2a, 0x96, 0xa3}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 814 + {SEC_OID_SHA256, + 814, + {0x30, 0x22, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78, 0xf7, + 0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef, 0x32, 0xb2, + 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5c, 0x02, 0x01, 0x00}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 815 + {SEC_OID_SHA256, + 815, + {0x30, 0x22, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78, 0xf7, + 0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef, 0x32, 0xb2, + 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5c, 0x02, 0x01, 0x01}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 816 + {SEC_OID_SHA256, + 816, + {0x30, 0x22, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78, 0xf7, + 0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef, 0x32, 0xb2, + 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5c, 0x02, 0x01, 0xff}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 817 + {SEC_OID_SHA256, + 817, + {0x30, 0x3d, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78, + 0xf7, 0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef, + 0x32, 0xb2, 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5c, + 0x02, 0x1c, 0x5d, 0x7b, 0x4b, 0x53, 0x42, 0xbc, 0x7b, 0xef, 0xef, + 0x73, 0xfd, 0x33, 0xe4, 0xbb, 0xe3, 0xc2, 0xf7, 0x99, 0x59, 0x19, + 0xdd, 0x72, 0xc0, 0x60, 0x5e, 0x6a, 0xb4, 0xae}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 818 + {SEC_OID_SHA256, + 818, + {0x30, 0x3d, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78, + 0xf7, 0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef, + 0x32, 0xb2, 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5c, + 0x02, 0x1c, 0x5d, 0x7b, 0x4b, 0x53, 0x42, 0xbc, 0x7b, 0xef, 0xef, + 0x73, 0xfd, 0x33, 0xe4, 0xbb, 0xe3, 0xc2, 0xf7, 0x99, 0x59, 0x19, + 0xdd, 0x72, 0xc0, 0x60, 0x5e, 0x6a, 0xb4, 0xaf}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 819 + {SEC_OID_SHA256, + 819, + {0x30, 0x3e, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78, + 0xf7, 0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef, + 0x32, 0xb2, 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5c, + 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78, 0xf7, 0xdf, + 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef, 0x32, 0xb2, + 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5c}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 820 + {SEC_OID_SHA256, + 820, + {0x30, 0x3e, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78, + 0xf7, 0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef, + 0x32, 0xb2, 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5c, + 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78, 0xf7, 0xdf, + 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef, 0x32, 0xb2, + 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5d}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 821 + {SEC_OID_SHA256, + 821, + {0x30, 0x3e, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78, + 0xf7, 0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef, + 0x32, 0xb2, 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5c, + 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78, 0xf7, 0xdf, + 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef, 0x32, 0xb2, + 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5e}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 822 + {SEC_OID_SHA256, + 822, + {0x30, 0x3e, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78, + 0xf7, 0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef, + 0x32, 0xb2, 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5c, + 0x02, 0x1d, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, + 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, + 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 823 + {SEC_OID_SHA256, + 823, + {0x30, 0x82, 0x01, 0x24, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, + 0x78, 0xf7, 0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef, + 0x32, 0xb2, 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5c, 0x02, + 0x82, 0x01, 0x01, 0x00, 0x8f, 0x79, 0x35, 0xd9, 0xb9, 0xaa, 0xe9, 0xbf, + 0xab, 0xed, 0x88, 0x7a, 0xcf, 0x49, 0x51, 0xb6, 0xf3, 0x2e, 0xc5, 0x9e, + 0x3b, 0xaf, 0x37, 0x18, 0xe8, 0xea, 0xc4, 0x96, 0x1f, 0x3e, 0xfd, 0x36, + 0x06, 0xe7, 0x43, 0x51, 0xa9, 0xc4, 0x18, 0x33, 0x39, 0xb8, 0x09, 0xe7, + 0xc2, 0xae, 0x1c, 0x53, 0x9b, 0xa7, 0x47, 0x5b, 0x85, 0xd0, 0x11, 0xad, + 0xb8, 0xb4, 0x79, 0x87, 0x75, 0x49, 0x84, 0x69, 0x5c, 0xac, 0x0e, 0x8f, + 0x14, 0xb3, 0x36, 0x08, 0x28, 0xa2, 0x2f, 0xfa, 0x27, 0x11, 0x0a, 0x3d, + 0x62, 0xa9, 0x93, 0x45, 0x34, 0x09, 0xa0, 0xfe, 0x69, 0x6c, 0x46, 0x58, + 0xf8, 0x4b, 0xdd, 0x20, 0x81, 0x9c, 0x37, 0x09, 0xa0, 0x10, 0x57, 0xb1, + 0x95, 0xad, 0xcd, 0x00, 0x23, 0x3d, 0xba, 0x54, 0x84, 0xb6, 0x29, 0x1f, + 0x9d, 0x64, 0x8e, 0xf8, 0x83, 0x44, 0x86, 0x77, 0x97, 0x9c, 0xec, 0x04, + 0xb4, 0x34, 0xa6, 0xac, 0x2e, 0x75, 0xe9, 0x98, 0x5d, 0xe2, 0x3d, 0xb0, + 0x29, 0x2f, 0xc1, 0x11, 0x8c, 0x9f, 0xfa, 0x9d, 0x81, 0x81, 0xe7, 0x33, + 0x8d, 0xb7, 0x92, 0xb7, 0x30, 0xd7, 0xb9, 0xe3, 0x49, 0x59, 0x2f, 0x68, + 0x09, 0x98, 0x72, 0x15, 0x39, 0x15, 0xea, 0x3d, 0x6b, 0x8b, 0x46, 0x53, + 0xc6, 0x33, 0x45, 0x8f, 0x80, 0x3b, 0x32, 0xa4, 0xc2, 0xe0, 0xf2, 0x72, + 0x90, 0x25, 0x6e, 0x4e, 0x3f, 0x8a, 0x3b, 0x08, 0x38, 0xa1, 0xc4, 0x50, + 0xe4, 0xe1, 0x8c, 0x1a, 0x29, 0xa3, 0x7d, 0xdf, 0x5e, 0xa1, 0x43, 0xde, + 0x4b, 0x66, 0xff, 0x04, 0x90, 0x3e, 0xd5, 0xcf, 0x16, 0x23, 0xe1, 0x58, + 0xd4, 0x87, 0xc6, 0x08, 0xe9, 0x7f, 0x21, 0x1c, 0xd8, 0x1d, 0xca, 0x23, + 0xcb, 0x6e, 0x38, 0x07, 0x65, 0xf8, 0x22, 0xe3, 0x42, 0xbe, 0x48, 0x4c, + 0x05, 0x76, 0x39, 0x39, 0x60, 0x1c, 0xd6, 0x67}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 824 + {SEC_OID_SHA256, + 824, + {0x30, 0x24, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, + 0x78, 0xf7, 0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, + 0x85, 0xef, 0x32, 0xb2, 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, + 0xd5, 0x69, 0x5c, 0x09, 0x03, 0x80, 0xfe, 0x01}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 825 + {SEC_OID_SHA256, + 825, + {0x30, 0x22, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78, 0xf7, + 0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef, 0x32, 0xb2, + 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5c, 0x09, 0x01, 0x42}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 826 + {SEC_OID_SHA256, + 826, + {0x30, 0x3e, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78, + 0xf7, 0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef, + 0x32, 0xb2, 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5d, + 0x02, 0x1d, 0xff, 0x45, 0x09, 0x69, 0x59, 0x7a, 0x87, 0x08, 0x20, + 0x21, 0x18, 0x05, 0x98, 0x36, 0x88, 0x38, 0x7a, 0x10, 0xcd, 0x4d, + 0xcc, 0x45, 0x1a, 0x7f, 0x3f, 0x43, 0x2a, 0x96, 0xa3}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 827 + {SEC_OID_SHA256, + 827, + {0x30, 0x22, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78, 0xf7, + 0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef, 0x32, 0xb2, + 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5d, 0x02, 0x01, 0x00}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 828 + {SEC_OID_SHA256, + 828, + {0x30, 0x22, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78, 0xf7, + 0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef, 0x32, 0xb2, + 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5d, 0x02, 0x01, 0x01}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 829 + {SEC_OID_SHA256, + 829, + {0x30, 0x22, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78, 0xf7, + 0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef, 0x32, 0xb2, + 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5d, 0x02, 0x01, 0xff}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 830 + {SEC_OID_SHA256, + 830, + {0x30, 0x3d, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78, + 0xf7, 0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef, + 0x32, 0xb2, 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5d, + 0x02, 0x1c, 0x5d, 0x7b, 0x4b, 0x53, 0x42, 0xbc, 0x7b, 0xef, 0xef, + 0x73, 0xfd, 0x33, 0xe4, 0xbb, 0xe3, 0xc2, 0xf7, 0x99, 0x59, 0x19, + 0xdd, 0x72, 0xc0, 0x60, 0x5e, 0x6a, 0xb4, 0xae}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 831 + {SEC_OID_SHA256, + 831, + {0x30, 0x3d, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78, + 0xf7, 0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef, + 0x32, 0xb2, 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5d, + 0x02, 0x1c, 0x5d, 0x7b, 0x4b, 0x53, 0x42, 0xbc, 0x7b, 0xef, 0xef, + 0x73, 0xfd, 0x33, 0xe4, 0xbb, 0xe3, 0xc2, 0xf7, 0x99, 0x59, 0x19, + 0xdd, 0x72, 0xc0, 0x60, 0x5e, 0x6a, 0xb4, 0xaf}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 832 + {SEC_OID_SHA256, + 832, + {0x30, 0x3e, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78, + 0xf7, 0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef, + 0x32, 0xb2, 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5d, + 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78, 0xf7, 0xdf, + 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef, 0x32, 0xb2, + 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5c}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 833 + {SEC_OID_SHA256, + 833, + {0x30, 0x3e, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78, + 0xf7, 0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef, + 0x32, 0xb2, 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5d, + 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78, 0xf7, 0xdf, + 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef, 0x32, 0xb2, + 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5d}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 834 + {SEC_OID_SHA256, + 834, + {0x30, 0x3e, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78, + 0xf7, 0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef, + 0x32, 0xb2, 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5d, + 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78, 0xf7, 0xdf, + 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef, 0x32, 0xb2, + 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5e}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 835 + {SEC_OID_SHA256, + 835, + {0x30, 0x3e, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78, + 0xf7, 0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef, + 0x32, 0xb2, 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5d, + 0x02, 0x1d, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, + 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, + 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 836 + {SEC_OID_SHA256, + 836, + {0x30, 0x82, 0x01, 0x24, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, + 0x78, 0xf7, 0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef, + 0x32, 0xb2, 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5d, 0x02, + 0x82, 0x01, 0x01, 0x00, 0x8f, 0x79, 0x35, 0xd9, 0xb9, 0xaa, 0xe9, 0xbf, + 0xab, 0xed, 0x88, 0x7a, 0xcf, 0x49, 0x51, 0xb6, 0xf3, 0x2e, 0xc5, 0x9e, + 0x3b, 0xaf, 0x37, 0x18, 0xe8, 0xea, 0xc4, 0x96, 0x1f, 0x3e, 0xfd, 0x36, + 0x06, 0xe7, 0x43, 0x51, 0xa9, 0xc4, 0x18, 0x33, 0x39, 0xb8, 0x09, 0xe7, + 0xc2, 0xae, 0x1c, 0x53, 0x9b, 0xa7, 0x47, 0x5b, 0x85, 0xd0, 0x11, 0xad, + 0xb8, 0xb4, 0x79, 0x87, 0x75, 0x49, 0x84, 0x69, 0x5c, 0xac, 0x0e, 0x8f, + 0x14, 0xb3, 0x36, 0x08, 0x28, 0xa2, 0x2f, 0xfa, 0x27, 0x11, 0x0a, 0x3d, + 0x62, 0xa9, 0x93, 0x45, 0x34, 0x09, 0xa0, 0xfe, 0x69, 0x6c, 0x46, 0x58, + 0xf8, 0x4b, 0xdd, 0x20, 0x81, 0x9c, 0x37, 0x09, 0xa0, 0x10, 0x57, 0xb1, + 0x95, 0xad, 0xcd, 0x00, 0x23, 0x3d, 0xba, 0x54, 0x84, 0xb6, 0x29, 0x1f, + 0x9d, 0x64, 0x8e, 0xf8, 0x83, 0x44, 0x86, 0x77, 0x97, 0x9c, 0xec, 0x04, + 0xb4, 0x34, 0xa6, 0xac, 0x2e, 0x75, 0xe9, 0x98, 0x5d, 0xe2, 0x3d, 0xb0, + 0x29, 0x2f, 0xc1, 0x11, 0x8c, 0x9f, 0xfa, 0x9d, 0x81, 0x81, 0xe7, 0x33, + 0x8d, 0xb7, 0x92, 0xb7, 0x30, 0xd7, 0xb9, 0xe3, 0x49, 0x59, 0x2f, 0x68, + 0x09, 0x98, 0x72, 0x15, 0x39, 0x15, 0xea, 0x3d, 0x6b, 0x8b, 0x46, 0x53, + 0xc6, 0x33, 0x45, 0x8f, 0x80, 0x3b, 0x32, 0xa4, 0xc2, 0xe0, 0xf2, 0x72, + 0x90, 0x25, 0x6e, 0x4e, 0x3f, 0x8a, 0x3b, 0x08, 0x38, 0xa1, 0xc4, 0x50, + 0xe4, 0xe1, 0x8c, 0x1a, 0x29, 0xa3, 0x7d, 0xdf, 0x5e, 0xa1, 0x43, 0xde, + 0x4b, 0x66, 0xff, 0x04, 0x90, 0x3e, 0xd5, 0xcf, 0x16, 0x23, 0xe1, 0x58, + 0xd4, 0x87, 0xc6, 0x08, 0xe9, 0x7f, 0x21, 0x1c, 0xd8, 0x1d, 0xca, 0x23, + 0xcb, 0x6e, 0x38, 0x07, 0x65, 0xf8, 0x22, 0xe3, 0x42, 0xbe, 0x48, 0x4c, + 0x05, 0x76, 0x39, 0x39, 0x60, 0x1c, 0xd6, 0x67}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 837 + {SEC_OID_SHA256, + 837, + {0x30, 0x24, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, + 0x78, 0xf7, 0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, + 0x85, 0xef, 0x32, 0xb2, 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, + 0xd5, 0x69, 0x5d, 0x09, 0x03, 0x80, 0xfe, 0x01}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 838 + {SEC_OID_SHA256, + 838, + {0x30, 0x22, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78, 0xf7, + 0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef, 0x32, 0xb2, + 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5d, 0x09, 0x01, 0x42}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 839 + {SEC_OID_SHA256, + 839, + {0x30, 0x3e, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78, + 0xf7, 0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef, + 0x32, 0xb2, 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5e, + 0x02, 0x1d, 0xff, 0x45, 0x09, 0x69, 0x59, 0x7a, 0x87, 0x08, 0x20, + 0x21, 0x18, 0x05, 0x98, 0x36, 0x88, 0x38, 0x7a, 0x10, 0xcd, 0x4d, + 0xcc, 0x45, 0x1a, 0x7f, 0x3f, 0x43, 0x2a, 0x96, 0xa3}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 840 + {SEC_OID_SHA256, + 840, + {0x30, 0x22, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78, 0xf7, + 0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef, 0x32, 0xb2, + 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5e, 0x02, 0x01, 0x00}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 841 + {SEC_OID_SHA256, + 841, + {0x30, 0x22, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78, 0xf7, + 0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef, 0x32, 0xb2, + 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5e, 0x02, 0x01, 0x01}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 842 + {SEC_OID_SHA256, + 842, + {0x30, 0x22, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78, 0xf7, + 0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef, 0x32, 0xb2, + 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5e, 0x02, 0x01, 0xff}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 843 + {SEC_OID_SHA256, + 843, + {0x30, 0x3d, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78, + 0xf7, 0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef, + 0x32, 0xb2, 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5e, + 0x02, 0x1c, 0x5d, 0x7b, 0x4b, 0x53, 0x42, 0xbc, 0x7b, 0xef, 0xef, + 0x73, 0xfd, 0x33, 0xe4, 0xbb, 0xe3, 0xc2, 0xf7, 0x99, 0x59, 0x19, + 0xdd, 0x72, 0xc0, 0x60, 0x5e, 0x6a, 0xb4, 0xae}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 844 + {SEC_OID_SHA256, + 844, + {0x30, 0x3d, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78, + 0xf7, 0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef, + 0x32, 0xb2, 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5e, + 0x02, 0x1c, 0x5d, 0x7b, 0x4b, 0x53, 0x42, 0xbc, 0x7b, 0xef, 0xef, + 0x73, 0xfd, 0x33, 0xe4, 0xbb, 0xe3, 0xc2, 0xf7, 0x99, 0x59, 0x19, + 0xdd, 0x72, 0xc0, 0x60, 0x5e, 0x6a, 0xb4, 0xaf}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 845 + {SEC_OID_SHA256, + 845, + {0x30, 0x3e, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78, + 0xf7, 0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef, + 0x32, 0xb2, 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5e, + 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78, 0xf7, 0xdf, + 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef, 0x32, 0xb2, + 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5c}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 846 + {SEC_OID_SHA256, + 846, + {0x30, 0x3e, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78, + 0xf7, 0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef, + 0x32, 0xb2, 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5e, + 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78, 0xf7, 0xdf, + 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef, 0x32, 0xb2, + 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5d}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 847 + {SEC_OID_SHA256, + 847, + {0x30, 0x3e, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78, + 0xf7, 0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef, + 0x32, 0xb2, 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5e, + 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78, 0xf7, 0xdf, + 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef, 0x32, 0xb2, + 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5e}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 848 + {SEC_OID_SHA256, + 848, + {0x30, 0x3e, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78, + 0xf7, 0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef, + 0x32, 0xb2, 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5e, + 0x02, 0x1d, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, + 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, + 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 849 + {SEC_OID_SHA256, + 849, + {0x30, 0x82, 0x01, 0x24, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, + 0x78, 0xf7, 0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef, + 0x32, 0xb2, 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5e, 0x02, + 0x82, 0x01, 0x01, 0x00, 0x8f, 0x79, 0x35, 0xd9, 0xb9, 0xaa, 0xe9, 0xbf, + 0xab, 0xed, 0x88, 0x7a, 0xcf, 0x49, 0x51, 0xb6, 0xf3, 0x2e, 0xc5, 0x9e, + 0x3b, 0xaf, 0x37, 0x18, 0xe8, 0xea, 0xc4, 0x96, 0x1f, 0x3e, 0xfd, 0x36, + 0x06, 0xe7, 0x43, 0x51, 0xa9, 0xc4, 0x18, 0x33, 0x39, 0xb8, 0x09, 0xe7, + 0xc2, 0xae, 0x1c, 0x53, 0x9b, 0xa7, 0x47, 0x5b, 0x85, 0xd0, 0x11, 0xad, + 0xb8, 0xb4, 0x79, 0x87, 0x75, 0x49, 0x84, 0x69, 0x5c, 0xac, 0x0e, 0x8f, + 0x14, 0xb3, 0x36, 0x08, 0x28, 0xa2, 0x2f, 0xfa, 0x27, 0x11, 0x0a, 0x3d, + 0x62, 0xa9, 0x93, 0x45, 0x34, 0x09, 0xa0, 0xfe, 0x69, 0x6c, 0x46, 0x58, + 0xf8, 0x4b, 0xdd, 0x20, 0x81, 0x9c, 0x37, 0x09, 0xa0, 0x10, 0x57, 0xb1, + 0x95, 0xad, 0xcd, 0x00, 0x23, 0x3d, 0xba, 0x54, 0x84, 0xb6, 0x29, 0x1f, + 0x9d, 0x64, 0x8e, 0xf8, 0x83, 0x44, 0x86, 0x77, 0x97, 0x9c, 0xec, 0x04, + 0xb4, 0x34, 0xa6, 0xac, 0x2e, 0x75, 0xe9, 0x98, 0x5d, 0xe2, 0x3d, 0xb0, + 0x29, 0x2f, 0xc1, 0x11, 0x8c, 0x9f, 0xfa, 0x9d, 0x81, 0x81, 0xe7, 0x33, + 0x8d, 0xb7, 0x92, 0xb7, 0x30, 0xd7, 0xb9, 0xe3, 0x49, 0x59, 0x2f, 0x68, + 0x09, 0x98, 0x72, 0x15, 0x39, 0x15, 0xea, 0x3d, 0x6b, 0x8b, 0x46, 0x53, + 0xc6, 0x33, 0x45, 0x8f, 0x80, 0x3b, 0x32, 0xa4, 0xc2, 0xe0, 0xf2, 0x72, + 0x90, 0x25, 0x6e, 0x4e, 0x3f, 0x8a, 0x3b, 0x08, 0x38, 0xa1, 0xc4, 0x50, + 0xe4, 0xe1, 0x8c, 0x1a, 0x29, 0xa3, 0x7d, 0xdf, 0x5e, 0xa1, 0x43, 0xde, + 0x4b, 0x66, 0xff, 0x04, 0x90, 0x3e, 0xd5, 0xcf, 0x16, 0x23, 0xe1, 0x58, + 0xd4, 0x87, 0xc6, 0x08, 0xe9, 0x7f, 0x21, 0x1c, 0xd8, 0x1d, 0xca, 0x23, + 0xcb, 0x6e, 0x38, 0x07, 0x65, 0xf8, 0x22, 0xe3, 0x42, 0xbe, 0x48, 0x4c, + 0x05, 0x76, 0x39, 0x39, 0x60, 0x1c, 0xd6, 0x67}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 850 + {SEC_OID_SHA256, + 850, + {0x30, 0x24, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, + 0x78, 0xf7, 0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, + 0x85, 0xef, 0x32, 0xb2, 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, + 0xd5, 0x69, 0x5e, 0x09, 0x03, 0x80, 0xfe, 0x01}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 851 + {SEC_OID_SHA256, + 851, + {0x30, 0x22, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78, 0xf7, + 0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef, 0x32, 0xb2, + 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5e, 0x09, 0x01, 0x42}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 852 + {SEC_OID_SHA256, + 852, + {0x30, 0x3e, 0x02, 0x1d, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, + 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, + 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, + 0x02, 0x1d, 0xff, 0x45, 0x09, 0x69, 0x59, 0x7a, 0x87, 0x08, 0x20, + 0x21, 0x18, 0x05, 0x98, 0x36, 0x88, 0x38, 0x7a, 0x10, 0xcd, 0x4d, + 0xcc, 0x45, 0x1a, 0x7f, 0x3f, 0x43, 0x2a, 0x96, 0xa3}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 853 + {SEC_OID_SHA256, + 853, + {0x30, 0x22, 0x02, 0x1d, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, + 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, + 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, 0x01, 0x00}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 854 + {SEC_OID_SHA256, + 854, + {0x30, 0x22, 0x02, 0x1d, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, + 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, + 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, 0x01, 0x01}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 855 + {SEC_OID_SHA256, + 855, + {0x30, 0x22, 0x02, 0x1d, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, + 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, + 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, 0x01, 0xff}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 856 + {SEC_OID_SHA256, + 856, + {0x30, 0x3d, 0x02, 0x1d, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, + 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, + 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, + 0x02, 0x1c, 0x5d, 0x7b, 0x4b, 0x53, 0x42, 0xbc, 0x7b, 0xef, 0xef, + 0x73, 0xfd, 0x33, 0xe4, 0xbb, 0xe3, 0xc2, 0xf7, 0x99, 0x59, 0x19, + 0xdd, 0x72, 0xc0, 0x60, 0x5e, 0x6a, 0xb4, 0xae}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 857 + {SEC_OID_SHA256, + 857, + {0x30, 0x3d, 0x02, 0x1d, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, + 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, + 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, + 0x02, 0x1c, 0x5d, 0x7b, 0x4b, 0x53, 0x42, 0xbc, 0x7b, 0xef, 0xef, + 0x73, 0xfd, 0x33, 0xe4, 0xbb, 0xe3, 0xc2, 0xf7, 0x99, 0x59, 0x19, + 0xdd, 0x72, 0xc0, 0x60, 0x5e, 0x6a, 0xb4, 0xaf}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 858 + {SEC_OID_SHA256, + 858, + {0x30, 0x3e, 0x02, 0x1d, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, + 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, + 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, + 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78, 0xf7, 0xdf, + 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef, 0x32, 0xb2, + 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5c}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 859 + {SEC_OID_SHA256, + 859, + {0x30, 0x3e, 0x02, 0x1d, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, + 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, + 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, + 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78, 0xf7, 0xdf, + 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef, 0x32, 0xb2, + 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5d}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 860 + {SEC_OID_SHA256, + 860, + {0x30, 0x3e, 0x02, 0x1d, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, + 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, + 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, + 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78, 0xf7, 0xdf, + 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef, 0x32, 0xb2, + 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5e}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 861 + {SEC_OID_SHA256, + 861, + {0x30, 0x3e, 0x02, 0x1d, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, + 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, + 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, + 0x02, 0x1d, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, + 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, + 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 862 + {SEC_OID_SHA256, + 862, + {0x30, 0x82, 0x01, 0x24, 0x02, 0x1d, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, + 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, + 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, + 0x82, 0x01, 0x01, 0x00, 0x8f, 0x79, 0x35, 0xd9, 0xb9, 0xaa, 0xe9, 0xbf, + 0xab, 0xed, 0x88, 0x7a, 0xcf, 0x49, 0x51, 0xb6, 0xf3, 0x2e, 0xc5, 0x9e, + 0x3b, 0xaf, 0x37, 0x18, 0xe8, 0xea, 0xc4, 0x96, 0x1f, 0x3e, 0xfd, 0x36, + 0x06, 0xe7, 0x43, 0x51, 0xa9, 0xc4, 0x18, 0x33, 0x39, 0xb8, 0x09, 0xe7, + 0xc2, 0xae, 0x1c, 0x53, 0x9b, 0xa7, 0x47, 0x5b, 0x85, 0xd0, 0x11, 0xad, + 0xb8, 0xb4, 0x79, 0x87, 0x75, 0x49, 0x84, 0x69, 0x5c, 0xac, 0x0e, 0x8f, + 0x14, 0xb3, 0x36, 0x08, 0x28, 0xa2, 0x2f, 0xfa, 0x27, 0x11, 0x0a, 0x3d, + 0x62, 0xa9, 0x93, 0x45, 0x34, 0x09, 0xa0, 0xfe, 0x69, 0x6c, 0x46, 0x58, + 0xf8, 0x4b, 0xdd, 0x20, 0x81, 0x9c, 0x37, 0x09, 0xa0, 0x10, 0x57, 0xb1, + 0x95, 0xad, 0xcd, 0x00, 0x23, 0x3d, 0xba, 0x54, 0x84, 0xb6, 0x29, 0x1f, + 0x9d, 0x64, 0x8e, 0xf8, 0x83, 0x44, 0x86, 0x77, 0x97, 0x9c, 0xec, 0x04, + 0xb4, 0x34, 0xa6, 0xac, 0x2e, 0x75, 0xe9, 0x98, 0x5d, 0xe2, 0x3d, 0xb0, + 0x29, 0x2f, 0xc1, 0x11, 0x8c, 0x9f, 0xfa, 0x9d, 0x81, 0x81, 0xe7, 0x33, + 0x8d, 0xb7, 0x92, 0xb7, 0x30, 0xd7, 0xb9, 0xe3, 0x49, 0x59, 0x2f, 0x68, + 0x09, 0x98, 0x72, 0x15, 0x39, 0x15, 0xea, 0x3d, 0x6b, 0x8b, 0x46, 0x53, + 0xc6, 0x33, 0x45, 0x8f, 0x80, 0x3b, 0x32, 0xa4, 0xc2, 0xe0, 0xf2, 0x72, + 0x90, 0x25, 0x6e, 0x4e, 0x3f, 0x8a, 0x3b, 0x08, 0x38, 0xa1, 0xc4, 0x50, + 0xe4, 0xe1, 0x8c, 0x1a, 0x29, 0xa3, 0x7d, 0xdf, 0x5e, 0xa1, 0x43, 0xde, + 0x4b, 0x66, 0xff, 0x04, 0x90, 0x3e, 0xd5, 0xcf, 0x16, 0x23, 0xe1, 0x58, + 0xd4, 0x87, 0xc6, 0x08, 0xe9, 0x7f, 0x21, 0x1c, 0xd8, 0x1d, 0xca, 0x23, + 0xcb, 0x6e, 0x38, 0x07, 0x65, 0xf8, 0x22, 0xe3, 0x42, 0xbe, 0x48, 0x4c, + 0x05, 0x76, 0x39, 0x39, 0x60, 0x1c, 0xd6, 0x67}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 863 + {SEC_OID_SHA256, + 863, + {0x30, 0x24, 0x02, 0x1d, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, + 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, + 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, + 0x00, 0x00, 0x00, 0x09, 0x03, 0x80, 0xfe, 0x01}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 864 + {SEC_OID_SHA256, + 864, + {0x30, 0x22, 0x02, 0x1d, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, + 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, + 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x09, 0x01, 0x42}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 865 + {SEC_OID_SHA256, + 865, + {0x30, 0x82, 0x01, 0x24, 0x02, 0x82, 0x01, 0x01, 0x00, 0x8f, 0x79, 0x35, + 0xd9, 0xb9, 0xaa, 0xe9, 0xbf, 0xab, 0xed, 0x88, 0x7a, 0xcf, 0x49, 0x51, + 0xb6, 0xf3, 0x2e, 0xc5, 0x9e, 0x3b, 0xaf, 0x37, 0x18, 0xe8, 0xea, 0xc4, + 0x96, 0x1f, 0x3e, 0xfd, 0x36, 0x06, 0xe7, 0x43, 0x51, 0xa9, 0xc4, 0x18, + 0x33, 0x39, 0xb8, 0x09, 0xe7, 0xc2, 0xae, 0x1c, 0x53, 0x9b, 0xa7, 0x47, + 0x5b, 0x85, 0xd0, 0x11, 0xad, 0xb8, 0xb4, 0x79, 0x87, 0x75, 0x49, 0x84, + 0x69, 0x5c, 0xac, 0x0e, 0x8f, 0x14, 0xb3, 0x36, 0x08, 0x28, 0xa2, 0x2f, + 0xfa, 0x27, 0x11, 0x0a, 0x3d, 0x62, 0xa9, 0x93, 0x45, 0x34, 0x09, 0xa0, + 0xfe, 0x69, 0x6c, 0x46, 0x58, 0xf8, 0x4b, 0xdd, 0x20, 0x81, 0x9c, 0x37, + 0x09, 0xa0, 0x10, 0x57, 0xb1, 0x95, 0xad, 0xcd, 0x00, 0x23, 0x3d, 0xba, + 0x54, 0x84, 0xb6, 0x29, 0x1f, 0x9d, 0x64, 0x8e, 0xf8, 0x83, 0x44, 0x86, + 0x77, 0x97, 0x9c, 0xec, 0x04, 0xb4, 0x34, 0xa6, 0xac, 0x2e, 0x75, 0xe9, + 0x98, 0x5d, 0xe2, 0x3d, 0xb0, 0x29, 0x2f, 0xc1, 0x11, 0x8c, 0x9f, 0xfa, + 0x9d, 0x81, 0x81, 0xe7, 0x33, 0x8d, 0xb7, 0x92, 0xb7, 0x30, 0xd7, 0xb9, + 0xe3, 0x49, 0x59, 0x2f, 0x68, 0x09, 0x98, 0x72, 0x15, 0x39, 0x15, 0xea, + 0x3d, 0x6b, 0x8b, 0x46, 0x53, 0xc6, 0x33, 0x45, 0x8f, 0x80, 0x3b, 0x32, + 0xa4, 0xc2, 0xe0, 0xf2, 0x72, 0x90, 0x25, 0x6e, 0x4e, 0x3f, 0x8a, 0x3b, + 0x08, 0x38, 0xa1, 0xc4, 0x50, 0xe4, 0xe1, 0x8c, 0x1a, 0x29, 0xa3, 0x7d, + 0xdf, 0x5e, 0xa1, 0x43, 0xde, 0x4b, 0x66, 0xff, 0x04, 0x90, 0x3e, 0xd5, + 0xcf, 0x16, 0x23, 0xe1, 0x58, 0xd4, 0x87, 0xc6, 0x08, 0xe9, 0x7f, 0x21, + 0x1c, 0xd8, 0x1d, 0xca, 0x23, 0xcb, 0x6e, 0x38, 0x07, 0x65, 0xf8, 0x22, + 0xe3, 0x42, 0xbe, 0x48, 0x4c, 0x05, 0x76, 0x39, 0x39, 0x60, 0x1c, 0xd6, + 0x67, 0x02, 0x1d, 0xff, 0x45, 0x09, 0x69, 0x59, 0x7a, 0x87, 0x08, 0x20, + 0x21, 0x18, 0x05, 0x98, 0x36, 0x88, 0x38, 0x7a, 0x10, 0xcd, 0x4d, 0xcc, + 0x45, 0x1a, 0x7f, 0x3f, 0x43, 0x2a, 0x96, 0xa3}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 866 + {SEC_OID_SHA256, + 866, + {0x30, 0x82, 0x01, 0x08, 0x02, 0x82, 0x01, 0x01, 0x00, 0x8f, 0x79, 0x35, + 0xd9, 0xb9, 0xaa, 0xe9, 0xbf, 0xab, 0xed, 0x88, 0x7a, 0xcf, 0x49, 0x51, + 0xb6, 0xf3, 0x2e, 0xc5, 0x9e, 0x3b, 0xaf, 0x37, 0x18, 0xe8, 0xea, 0xc4, + 0x96, 0x1f, 0x3e, 0xfd, 0x36, 0x06, 0xe7, 0x43, 0x51, 0xa9, 0xc4, 0x18, + 0x33, 0x39, 0xb8, 0x09, 0xe7, 0xc2, 0xae, 0x1c, 0x53, 0x9b, 0xa7, 0x47, + 0x5b, 0x85, 0xd0, 0x11, 0xad, 0xb8, 0xb4, 0x79, 0x87, 0x75, 0x49, 0x84, + 0x69, 0x5c, 0xac, 0x0e, 0x8f, 0x14, 0xb3, 0x36, 0x08, 0x28, 0xa2, 0x2f, + 0xfa, 0x27, 0x11, 0x0a, 0x3d, 0x62, 0xa9, 0x93, 0x45, 0x34, 0x09, 0xa0, + 0xfe, 0x69, 0x6c, 0x46, 0x58, 0xf8, 0x4b, 0xdd, 0x20, 0x81, 0x9c, 0x37, + 0x09, 0xa0, 0x10, 0x57, 0xb1, 0x95, 0xad, 0xcd, 0x00, 0x23, 0x3d, 0xba, + 0x54, 0x84, 0xb6, 0x29, 0x1f, 0x9d, 0x64, 0x8e, 0xf8, 0x83, 0x44, 0x86, + 0x77, 0x97, 0x9c, 0xec, 0x04, 0xb4, 0x34, 0xa6, 0xac, 0x2e, 0x75, 0xe9, + 0x98, 0x5d, 0xe2, 0x3d, 0xb0, 0x29, 0x2f, 0xc1, 0x11, 0x8c, 0x9f, 0xfa, + 0x9d, 0x81, 0x81, 0xe7, 0x33, 0x8d, 0xb7, 0x92, 0xb7, 0x30, 0xd7, 0xb9, + 0xe3, 0x49, 0x59, 0x2f, 0x68, 0x09, 0x98, 0x72, 0x15, 0x39, 0x15, 0xea, + 0x3d, 0x6b, 0x8b, 0x46, 0x53, 0xc6, 0x33, 0x45, 0x8f, 0x80, 0x3b, 0x32, + 0xa4, 0xc2, 0xe0, 0xf2, 0x72, 0x90, 0x25, 0x6e, 0x4e, 0x3f, 0x8a, 0x3b, + 0x08, 0x38, 0xa1, 0xc4, 0x50, 0xe4, 0xe1, 0x8c, 0x1a, 0x29, 0xa3, 0x7d, + 0xdf, 0x5e, 0xa1, 0x43, 0xde, 0x4b, 0x66, 0xff, 0x04, 0x90, 0x3e, 0xd5, + 0xcf, 0x16, 0x23, 0xe1, 0x58, 0xd4, 0x87, 0xc6, 0x08, 0xe9, 0x7f, 0x21, + 0x1c, 0xd8, 0x1d, 0xca, 0x23, 0xcb, 0x6e, 0x38, 0x07, 0x65, 0xf8, 0x22, + 0xe3, 0x42, 0xbe, 0x48, 0x4c, 0x05, 0x76, 0x39, 0x39, 0x60, 0x1c, 0xd6, + 0x67, 0x02, 0x01, 0x00}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 867 + {SEC_OID_SHA256, + 867, + {0x30, 0x82, 0x01, 0x08, 0x02, 0x82, 0x01, 0x01, 0x00, 0x8f, 0x79, 0x35, + 0xd9, 0xb9, 0xaa, 0xe9, 0xbf, 0xab, 0xed, 0x88, 0x7a, 0xcf, 0x49, 0x51, + 0xb6, 0xf3, 0x2e, 0xc5, 0x9e, 0x3b, 0xaf, 0x37, 0x18, 0xe8, 0xea, 0xc4, + 0x96, 0x1f, 0x3e, 0xfd, 0x36, 0x06, 0xe7, 0x43, 0x51, 0xa9, 0xc4, 0x18, + 0x33, 0x39, 0xb8, 0x09, 0xe7, 0xc2, 0xae, 0x1c, 0x53, 0x9b, 0xa7, 0x47, + 0x5b, 0x85, 0xd0, 0x11, 0xad, 0xb8, 0xb4, 0x79, 0x87, 0x75, 0x49, 0x84, + 0x69, 0x5c, 0xac, 0x0e, 0x8f, 0x14, 0xb3, 0x36, 0x08, 0x28, 0xa2, 0x2f, + 0xfa, 0x27, 0x11, 0x0a, 0x3d, 0x62, 0xa9, 0x93, 0x45, 0x34, 0x09, 0xa0, + 0xfe, 0x69, 0x6c, 0x46, 0x58, 0xf8, 0x4b, 0xdd, 0x20, 0x81, 0x9c, 0x37, + 0x09, 0xa0, 0x10, 0x57, 0xb1, 0x95, 0xad, 0xcd, 0x00, 0x23, 0x3d, 0xba, + 0x54, 0x84, 0xb6, 0x29, 0x1f, 0x9d, 0x64, 0x8e, 0xf8, 0x83, 0x44, 0x86, + 0x77, 0x97, 0x9c, 0xec, 0x04, 0xb4, 0x34, 0xa6, 0xac, 0x2e, 0x75, 0xe9, + 0x98, 0x5d, 0xe2, 0x3d, 0xb0, 0x29, 0x2f, 0xc1, 0x11, 0x8c, 0x9f, 0xfa, + 0x9d, 0x81, 0x81, 0xe7, 0x33, 0x8d, 0xb7, 0x92, 0xb7, 0x30, 0xd7, 0xb9, + 0xe3, 0x49, 0x59, 0x2f, 0x68, 0x09, 0x98, 0x72, 0x15, 0x39, 0x15, 0xea, + 0x3d, 0x6b, 0x8b, 0x46, 0x53, 0xc6, 0x33, 0x45, 0x8f, 0x80, 0x3b, 0x32, + 0xa4, 0xc2, 0xe0, 0xf2, 0x72, 0x90, 0x25, 0x6e, 0x4e, 0x3f, 0x8a, 0x3b, + 0x08, 0x38, 0xa1, 0xc4, 0x50, 0xe4, 0xe1, 0x8c, 0x1a, 0x29, 0xa3, 0x7d, + 0xdf, 0x5e, 0xa1, 0x43, 0xde, 0x4b, 0x66, 0xff, 0x04, 0x90, 0x3e, 0xd5, + 0xcf, 0x16, 0x23, 0xe1, 0x58, 0xd4, 0x87, 0xc6, 0x08, 0xe9, 0x7f, 0x21, + 0x1c, 0xd8, 0x1d, 0xca, 0x23, 0xcb, 0x6e, 0x38, 0x07, 0x65, 0xf8, 0x22, + 0xe3, 0x42, 0xbe, 0x48, 0x4c, 0x05, 0x76, 0x39, 0x39, 0x60, 0x1c, 0xd6, + 0x67, 0x02, 0x01, 0x01}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 868 + {SEC_OID_SHA256, + 868, + {0x30, 0x82, 0x01, 0x08, 0x02, 0x82, 0x01, 0x01, 0x00, 0x8f, 0x79, 0x35, + 0xd9, 0xb9, 0xaa, 0xe9, 0xbf, 0xab, 0xed, 0x88, 0x7a, 0xcf, 0x49, 0x51, + 0xb6, 0xf3, 0x2e, 0xc5, 0x9e, 0x3b, 0xaf, 0x37, 0x18, 0xe8, 0xea, 0xc4, + 0x96, 0x1f, 0x3e, 0xfd, 0x36, 0x06, 0xe7, 0x43, 0x51, 0xa9, 0xc4, 0x18, + 0x33, 0x39, 0xb8, 0x09, 0xe7, 0xc2, 0xae, 0x1c, 0x53, 0x9b, 0xa7, 0x47, + 0x5b, 0x85, 0xd0, 0x11, 0xad, 0xb8, 0xb4, 0x79, 0x87, 0x75, 0x49, 0x84, + 0x69, 0x5c, 0xac, 0x0e, 0x8f, 0x14, 0xb3, 0x36, 0x08, 0x28, 0xa2, 0x2f, + 0xfa, 0x27, 0x11, 0x0a, 0x3d, 0x62, 0xa9, 0x93, 0x45, 0x34, 0x09, 0xa0, + 0xfe, 0x69, 0x6c, 0x46, 0x58, 0xf8, 0x4b, 0xdd, 0x20, 0x81, 0x9c, 0x37, + 0x09, 0xa0, 0x10, 0x57, 0xb1, 0x95, 0xad, 0xcd, 0x00, 0x23, 0x3d, 0xba, + 0x54, 0x84, 0xb6, 0x29, 0x1f, 0x9d, 0x64, 0x8e, 0xf8, 0x83, 0x44, 0x86, + 0x77, 0x97, 0x9c, 0xec, 0x04, 0xb4, 0x34, 0xa6, 0xac, 0x2e, 0x75, 0xe9, + 0x98, 0x5d, 0xe2, 0x3d, 0xb0, 0x29, 0x2f, 0xc1, 0x11, 0x8c, 0x9f, 0xfa, + 0x9d, 0x81, 0x81, 0xe7, 0x33, 0x8d, 0xb7, 0x92, 0xb7, 0x30, 0xd7, 0xb9, + 0xe3, 0x49, 0x59, 0x2f, 0x68, 0x09, 0x98, 0x72, 0x15, 0x39, 0x15, 0xea, + 0x3d, 0x6b, 0x8b, 0x46, 0x53, 0xc6, 0x33, 0x45, 0x8f, 0x80, 0x3b, 0x32, + 0xa4, 0xc2, 0xe0, 0xf2, 0x72, 0x90, 0x25, 0x6e, 0x4e, 0x3f, 0x8a, 0x3b, + 0x08, 0x38, 0xa1, 0xc4, 0x50, 0xe4, 0xe1, 0x8c, 0x1a, 0x29, 0xa3, 0x7d, + 0xdf, 0x5e, 0xa1, 0x43, 0xde, 0x4b, 0x66, 0xff, 0x04, 0x90, 0x3e, 0xd5, + 0xcf, 0x16, 0x23, 0xe1, 0x58, 0xd4, 0x87, 0xc6, 0x08, 0xe9, 0x7f, 0x21, + 0x1c, 0xd8, 0x1d, 0xca, 0x23, 0xcb, 0x6e, 0x38, 0x07, 0x65, 0xf8, 0x22, + 0xe3, 0x42, 0xbe, 0x48, 0x4c, 0x05, 0x76, 0x39, 0x39, 0x60, 0x1c, 0xd6, + 0x67, 0x02, 0x01, 0xff}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 869 + {SEC_OID_SHA256, + 869, + {0x30, 0x82, 0x01, 0x23, 0x02, 0x82, 0x01, 0x01, 0x00, 0x8f, 0x79, 0x35, + 0xd9, 0xb9, 0xaa, 0xe9, 0xbf, 0xab, 0xed, 0x88, 0x7a, 0xcf, 0x49, 0x51, + 0xb6, 0xf3, 0x2e, 0xc5, 0x9e, 0x3b, 0xaf, 0x37, 0x18, 0xe8, 0xea, 0xc4, + 0x96, 0x1f, 0x3e, 0xfd, 0x36, 0x06, 0xe7, 0x43, 0x51, 0xa9, 0xc4, 0x18, + 0x33, 0x39, 0xb8, 0x09, 0xe7, 0xc2, 0xae, 0x1c, 0x53, 0x9b, 0xa7, 0x47, + 0x5b, 0x85, 0xd0, 0x11, 0xad, 0xb8, 0xb4, 0x79, 0x87, 0x75, 0x49, 0x84, + 0x69, 0x5c, 0xac, 0x0e, 0x8f, 0x14, 0xb3, 0x36, 0x08, 0x28, 0xa2, 0x2f, + 0xfa, 0x27, 0x11, 0x0a, 0x3d, 0x62, 0xa9, 0x93, 0x45, 0x34, 0x09, 0xa0, + 0xfe, 0x69, 0x6c, 0x46, 0x58, 0xf8, 0x4b, 0xdd, 0x20, 0x81, 0x9c, 0x37, + 0x09, 0xa0, 0x10, 0x57, 0xb1, 0x95, 0xad, 0xcd, 0x00, 0x23, 0x3d, 0xba, + 0x54, 0x84, 0xb6, 0x29, 0x1f, 0x9d, 0x64, 0x8e, 0xf8, 0x83, 0x44, 0x86, + 0x77, 0x97, 0x9c, 0xec, 0x04, 0xb4, 0x34, 0xa6, 0xac, 0x2e, 0x75, 0xe9, + 0x98, 0x5d, 0xe2, 0x3d, 0xb0, 0x29, 0x2f, 0xc1, 0x11, 0x8c, 0x9f, 0xfa, + 0x9d, 0x81, 0x81, 0xe7, 0x33, 0x8d, 0xb7, 0x92, 0xb7, 0x30, 0xd7, 0xb9, + 0xe3, 0x49, 0x59, 0x2f, 0x68, 0x09, 0x98, 0x72, 0x15, 0x39, 0x15, 0xea, + 0x3d, 0x6b, 0x8b, 0x46, 0x53, 0xc6, 0x33, 0x45, 0x8f, 0x80, 0x3b, 0x32, + 0xa4, 0xc2, 0xe0, 0xf2, 0x72, 0x90, 0x25, 0x6e, 0x4e, 0x3f, 0x8a, 0x3b, + 0x08, 0x38, 0xa1, 0xc4, 0x50, 0xe4, 0xe1, 0x8c, 0x1a, 0x29, 0xa3, 0x7d, + 0xdf, 0x5e, 0xa1, 0x43, 0xde, 0x4b, 0x66, 0xff, 0x04, 0x90, 0x3e, 0xd5, + 0xcf, 0x16, 0x23, 0xe1, 0x58, 0xd4, 0x87, 0xc6, 0x08, 0xe9, 0x7f, 0x21, + 0x1c, 0xd8, 0x1d, 0xca, 0x23, 0xcb, 0x6e, 0x38, 0x07, 0x65, 0xf8, 0x22, + 0xe3, 0x42, 0xbe, 0x48, 0x4c, 0x05, 0x76, 0x39, 0x39, 0x60, 0x1c, 0xd6, + 0x67, 0x02, 0x1c, 0x5d, 0x7b, 0x4b, 0x53, 0x42, 0xbc, 0x7b, 0xef, 0xef, + 0x73, 0xfd, 0x33, 0xe4, 0xbb, 0xe3, 0xc2, 0xf7, 0x99, 0x59, 0x19, 0xdd, + 0x72, 0xc0, 0x60, 0x5e, 0x6a, 0xb4, 0xae}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 870 + {SEC_OID_SHA256, + 870, + {0x30, 0x82, 0x01, 0x23, 0x02, 0x82, 0x01, 0x01, 0x00, 0x8f, 0x79, 0x35, + 0xd9, 0xb9, 0xaa, 0xe9, 0xbf, 0xab, 0xed, 0x88, 0x7a, 0xcf, 0x49, 0x51, + 0xb6, 0xf3, 0x2e, 0xc5, 0x9e, 0x3b, 0xaf, 0x37, 0x18, 0xe8, 0xea, 0xc4, + 0x96, 0x1f, 0x3e, 0xfd, 0x36, 0x06, 0xe7, 0x43, 0x51, 0xa9, 0xc4, 0x18, + 0x33, 0x39, 0xb8, 0x09, 0xe7, 0xc2, 0xae, 0x1c, 0x53, 0x9b, 0xa7, 0x47, + 0x5b, 0x85, 0xd0, 0x11, 0xad, 0xb8, 0xb4, 0x79, 0x87, 0x75, 0x49, 0x84, + 0x69, 0x5c, 0xac, 0x0e, 0x8f, 0x14, 0xb3, 0x36, 0x08, 0x28, 0xa2, 0x2f, + 0xfa, 0x27, 0x11, 0x0a, 0x3d, 0x62, 0xa9, 0x93, 0x45, 0x34, 0x09, 0xa0, + 0xfe, 0x69, 0x6c, 0x46, 0x58, 0xf8, 0x4b, 0xdd, 0x20, 0x81, 0x9c, 0x37, + 0x09, 0xa0, 0x10, 0x57, 0xb1, 0x95, 0xad, 0xcd, 0x00, 0x23, 0x3d, 0xba, + 0x54, 0x84, 0xb6, 0x29, 0x1f, 0x9d, 0x64, 0x8e, 0xf8, 0x83, 0x44, 0x86, + 0x77, 0x97, 0x9c, 0xec, 0x04, 0xb4, 0x34, 0xa6, 0xac, 0x2e, 0x75, 0xe9, + 0x98, 0x5d, 0xe2, 0x3d, 0xb0, 0x29, 0x2f, 0xc1, 0x11, 0x8c, 0x9f, 0xfa, + 0x9d, 0x81, 0x81, 0xe7, 0x33, 0x8d, 0xb7, 0x92, 0xb7, 0x30, 0xd7, 0xb9, + 0xe3, 0x49, 0x59, 0x2f, 0x68, 0x09, 0x98, 0x72, 0x15, 0x39, 0x15, 0xea, + 0x3d, 0x6b, 0x8b, 0x46, 0x53, 0xc6, 0x33, 0x45, 0x8f, 0x80, 0x3b, 0x32, + 0xa4, 0xc2, 0xe0, 0xf2, 0x72, 0x90, 0x25, 0x6e, 0x4e, 0x3f, 0x8a, 0x3b, + 0x08, 0x38, 0xa1, 0xc4, 0x50, 0xe4, 0xe1, 0x8c, 0x1a, 0x29, 0xa3, 0x7d, + 0xdf, 0x5e, 0xa1, 0x43, 0xde, 0x4b, 0x66, 0xff, 0x04, 0x90, 0x3e, 0xd5, + 0xcf, 0x16, 0x23, 0xe1, 0x58, 0xd4, 0x87, 0xc6, 0x08, 0xe9, 0x7f, 0x21, + 0x1c, 0xd8, 0x1d, 0xca, 0x23, 0xcb, 0x6e, 0x38, 0x07, 0x65, 0xf8, 0x22, + 0xe3, 0x42, 0xbe, 0x48, 0x4c, 0x05, 0x76, 0x39, 0x39, 0x60, 0x1c, 0xd6, + 0x67, 0x02, 0x1c, 0x5d, 0x7b, 0x4b, 0x53, 0x42, 0xbc, 0x7b, 0xef, 0xef, + 0x73, 0xfd, 0x33, 0xe4, 0xbb, 0xe3, 0xc2, 0xf7, 0x99, 0x59, 0x19, 0xdd, + 0x72, 0xc0, 0x60, 0x5e, 0x6a, 0xb4, 0xaf}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 871 + {SEC_OID_SHA256, + 871, + {0x30, 0x82, 0x01, 0x24, 0x02, 0x82, 0x01, 0x01, 0x00, 0x8f, 0x79, 0x35, + 0xd9, 0xb9, 0xaa, 0xe9, 0xbf, 0xab, 0xed, 0x88, 0x7a, 0xcf, 0x49, 0x51, + 0xb6, 0xf3, 0x2e, 0xc5, 0x9e, 0x3b, 0xaf, 0x37, 0x18, 0xe8, 0xea, 0xc4, + 0x96, 0x1f, 0x3e, 0xfd, 0x36, 0x06, 0xe7, 0x43, 0x51, 0xa9, 0xc4, 0x18, + 0x33, 0x39, 0xb8, 0x09, 0xe7, 0xc2, 0xae, 0x1c, 0x53, 0x9b, 0xa7, 0x47, + 0x5b, 0x85, 0xd0, 0x11, 0xad, 0xb8, 0xb4, 0x79, 0x87, 0x75, 0x49, 0x84, + 0x69, 0x5c, 0xac, 0x0e, 0x8f, 0x14, 0xb3, 0x36, 0x08, 0x28, 0xa2, 0x2f, + 0xfa, 0x27, 0x11, 0x0a, 0x3d, 0x62, 0xa9, 0x93, 0x45, 0x34, 0x09, 0xa0, + 0xfe, 0x69, 0x6c, 0x46, 0x58, 0xf8, 0x4b, 0xdd, 0x20, 0x81, 0x9c, 0x37, + 0x09, 0xa0, 0x10, 0x57, 0xb1, 0x95, 0xad, 0xcd, 0x00, 0x23, 0x3d, 0xba, + 0x54, 0x84, 0xb6, 0x29, 0x1f, 0x9d, 0x64, 0x8e, 0xf8, 0x83, 0x44, 0x86, + 0x77, 0x97, 0x9c, 0xec, 0x04, 0xb4, 0x34, 0xa6, 0xac, 0x2e, 0x75, 0xe9, + 0x98, 0x5d, 0xe2, 0x3d, 0xb0, 0x29, 0x2f, 0xc1, 0x11, 0x8c, 0x9f, 0xfa, + 0x9d, 0x81, 0x81, 0xe7, 0x33, 0x8d, 0xb7, 0x92, 0xb7, 0x30, 0xd7, 0xb9, + 0xe3, 0x49, 0x59, 0x2f, 0x68, 0x09, 0x98, 0x72, 0x15, 0x39, 0x15, 0xea, + 0x3d, 0x6b, 0x8b, 0x46, 0x53, 0xc6, 0x33, 0x45, 0x8f, 0x80, 0x3b, 0x32, + 0xa4, 0xc2, 0xe0, 0xf2, 0x72, 0x90, 0x25, 0x6e, 0x4e, 0x3f, 0x8a, 0x3b, + 0x08, 0x38, 0xa1, 0xc4, 0x50, 0xe4, 0xe1, 0x8c, 0x1a, 0x29, 0xa3, 0x7d, + 0xdf, 0x5e, 0xa1, 0x43, 0xde, 0x4b, 0x66, 0xff, 0x04, 0x90, 0x3e, 0xd5, + 0xcf, 0x16, 0x23, 0xe1, 0x58, 0xd4, 0x87, 0xc6, 0x08, 0xe9, 0x7f, 0x21, + 0x1c, 0xd8, 0x1d, 0xca, 0x23, 0xcb, 0x6e, 0x38, 0x07, 0x65, 0xf8, 0x22, + 0xe3, 0x42, 0xbe, 0x48, 0x4c, 0x05, 0x76, 0x39, 0x39, 0x60, 0x1c, 0xd6, + 0x67, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78, 0xf7, 0xdf, + 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef, 0x32, 0xb2, 0x33, + 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5c}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 872 + {SEC_OID_SHA256, + 872, + {0x30, 0x82, 0x01, 0x24, 0x02, 0x82, 0x01, 0x01, 0x00, 0x8f, 0x79, 0x35, + 0xd9, 0xb9, 0xaa, 0xe9, 0xbf, 0xab, 0xed, 0x88, 0x7a, 0xcf, 0x49, 0x51, + 0xb6, 0xf3, 0x2e, 0xc5, 0x9e, 0x3b, 0xaf, 0x37, 0x18, 0xe8, 0xea, 0xc4, + 0x96, 0x1f, 0x3e, 0xfd, 0x36, 0x06, 0xe7, 0x43, 0x51, 0xa9, 0xc4, 0x18, + 0x33, 0x39, 0xb8, 0x09, 0xe7, 0xc2, 0xae, 0x1c, 0x53, 0x9b, 0xa7, 0x47, + 0x5b, 0x85, 0xd0, 0x11, 0xad, 0xb8, 0xb4, 0x79, 0x87, 0x75, 0x49, 0x84, + 0x69, 0x5c, 0xac, 0x0e, 0x8f, 0x14, 0xb3, 0x36, 0x08, 0x28, 0xa2, 0x2f, + 0xfa, 0x27, 0x11, 0x0a, 0x3d, 0x62, 0xa9, 0x93, 0x45, 0x34, 0x09, 0xa0, + 0xfe, 0x69, 0x6c, 0x46, 0x58, 0xf8, 0x4b, 0xdd, 0x20, 0x81, 0x9c, 0x37, + 0x09, 0xa0, 0x10, 0x57, 0xb1, 0x95, 0xad, 0xcd, 0x00, 0x23, 0x3d, 0xba, + 0x54, 0x84, 0xb6, 0x29, 0x1f, 0x9d, 0x64, 0x8e, 0xf8, 0x83, 0x44, 0x86, + 0x77, 0x97, 0x9c, 0xec, 0x04, 0xb4, 0x34, 0xa6, 0xac, 0x2e, 0x75, 0xe9, + 0x98, 0x5d, 0xe2, 0x3d, 0xb0, 0x29, 0x2f, 0xc1, 0x11, 0x8c, 0x9f, 0xfa, + 0x9d, 0x81, 0x81, 0xe7, 0x33, 0x8d, 0xb7, 0x92, 0xb7, 0x30, 0xd7, 0xb9, + 0xe3, 0x49, 0x59, 0x2f, 0x68, 0x09, 0x98, 0x72, 0x15, 0x39, 0x15, 0xea, + 0x3d, 0x6b, 0x8b, 0x46, 0x53, 0xc6, 0x33, 0x45, 0x8f, 0x80, 0x3b, 0x32, + 0xa4, 0xc2, 0xe0, 0xf2, 0x72, 0x90, 0x25, 0x6e, 0x4e, 0x3f, 0x8a, 0x3b, + 0x08, 0x38, 0xa1, 0xc4, 0x50, 0xe4, 0xe1, 0x8c, 0x1a, 0x29, 0xa3, 0x7d, + 0xdf, 0x5e, 0xa1, 0x43, 0xde, 0x4b, 0x66, 0xff, 0x04, 0x90, 0x3e, 0xd5, + 0xcf, 0x16, 0x23, 0xe1, 0x58, 0xd4, 0x87, 0xc6, 0x08, 0xe9, 0x7f, 0x21, + 0x1c, 0xd8, 0x1d, 0xca, 0x23, 0xcb, 0x6e, 0x38, 0x07, 0x65, 0xf8, 0x22, + 0xe3, 0x42, 0xbe, 0x48, 0x4c, 0x05, 0x76, 0x39, 0x39, 0x60, 0x1c, 0xd6, + 0x67, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78, 0xf7, 0xdf, + 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef, 0x32, 0xb2, 0x33, + 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5d}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 873 + {SEC_OID_SHA256, + 873, + {0x30, 0x82, 0x01, 0x24, 0x02, 0x82, 0x01, 0x01, 0x00, 0x8f, 0x79, 0x35, + 0xd9, 0xb9, 0xaa, 0xe9, 0xbf, 0xab, 0xed, 0x88, 0x7a, 0xcf, 0x49, 0x51, + 0xb6, 0xf3, 0x2e, 0xc5, 0x9e, 0x3b, 0xaf, 0x37, 0x18, 0xe8, 0xea, 0xc4, + 0x96, 0x1f, 0x3e, 0xfd, 0x36, 0x06, 0xe7, 0x43, 0x51, 0xa9, 0xc4, 0x18, + 0x33, 0x39, 0xb8, 0x09, 0xe7, 0xc2, 0xae, 0x1c, 0x53, 0x9b, 0xa7, 0x47, + 0x5b, 0x85, 0xd0, 0x11, 0xad, 0xb8, 0xb4, 0x79, 0x87, 0x75, 0x49, 0x84, + 0x69, 0x5c, 0xac, 0x0e, 0x8f, 0x14, 0xb3, 0x36, 0x08, 0x28, 0xa2, 0x2f, + 0xfa, 0x27, 0x11, 0x0a, 0x3d, 0x62, 0xa9, 0x93, 0x45, 0x34, 0x09, 0xa0, + 0xfe, 0x69, 0x6c, 0x46, 0x58, 0xf8, 0x4b, 0xdd, 0x20, 0x81, 0x9c, 0x37, + 0x09, 0xa0, 0x10, 0x57, 0xb1, 0x95, 0xad, 0xcd, 0x00, 0x23, 0x3d, 0xba, + 0x54, 0x84, 0xb6, 0x29, 0x1f, 0x9d, 0x64, 0x8e, 0xf8, 0x83, 0x44, 0x86, + 0x77, 0x97, 0x9c, 0xec, 0x04, 0xb4, 0x34, 0xa6, 0xac, 0x2e, 0x75, 0xe9, + 0x98, 0x5d, 0xe2, 0x3d, 0xb0, 0x29, 0x2f, 0xc1, 0x11, 0x8c, 0x9f, 0xfa, + 0x9d, 0x81, 0x81, 0xe7, 0x33, 0x8d, 0xb7, 0x92, 0xb7, 0x30, 0xd7, 0xb9, + 0xe3, 0x49, 0x59, 0x2f, 0x68, 0x09, 0x98, 0x72, 0x15, 0x39, 0x15, 0xea, + 0x3d, 0x6b, 0x8b, 0x46, 0x53, 0xc6, 0x33, 0x45, 0x8f, 0x80, 0x3b, 0x32, + 0xa4, 0xc2, 0xe0, 0xf2, 0x72, 0x90, 0x25, 0x6e, 0x4e, 0x3f, 0x8a, 0x3b, + 0x08, 0x38, 0xa1, 0xc4, 0x50, 0xe4, 0xe1, 0x8c, 0x1a, 0x29, 0xa3, 0x7d, + 0xdf, 0x5e, 0xa1, 0x43, 0xde, 0x4b, 0x66, 0xff, 0x04, 0x90, 0x3e, 0xd5, + 0xcf, 0x16, 0x23, 0xe1, 0x58, 0xd4, 0x87, 0xc6, 0x08, 0xe9, 0x7f, 0x21, + 0x1c, 0xd8, 0x1d, 0xca, 0x23, 0xcb, 0x6e, 0x38, 0x07, 0x65, 0xf8, 0x22, + 0xe3, 0x42, 0xbe, 0x48, 0x4c, 0x05, 0x76, 0x39, 0x39, 0x60, 0x1c, 0xd6, + 0x67, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78, 0xf7, 0xdf, + 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef, 0x32, 0xb2, 0x33, + 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5e}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 874 + {SEC_OID_SHA256, + 874, + {0x30, 0x82, 0x01, 0x24, 0x02, 0x82, 0x01, 0x01, 0x00, 0x8f, 0x79, 0x35, + 0xd9, 0xb9, 0xaa, 0xe9, 0xbf, 0xab, 0xed, 0x88, 0x7a, 0xcf, 0x49, 0x51, + 0xb6, 0xf3, 0x2e, 0xc5, 0x9e, 0x3b, 0xaf, 0x37, 0x18, 0xe8, 0xea, 0xc4, + 0x96, 0x1f, 0x3e, 0xfd, 0x36, 0x06, 0xe7, 0x43, 0x51, 0xa9, 0xc4, 0x18, + 0x33, 0x39, 0xb8, 0x09, 0xe7, 0xc2, 0xae, 0x1c, 0x53, 0x9b, 0xa7, 0x47, + 0x5b, 0x85, 0xd0, 0x11, 0xad, 0xb8, 0xb4, 0x79, 0x87, 0x75, 0x49, 0x84, + 0x69, 0x5c, 0xac, 0x0e, 0x8f, 0x14, 0xb3, 0x36, 0x08, 0x28, 0xa2, 0x2f, + 0xfa, 0x27, 0x11, 0x0a, 0x3d, 0x62, 0xa9, 0x93, 0x45, 0x34, 0x09, 0xa0, + 0xfe, 0x69, 0x6c, 0x46, 0x58, 0xf8, 0x4b, 0xdd, 0x20, 0x81, 0x9c, 0x37, + 0x09, 0xa0, 0x10, 0x57, 0xb1, 0x95, 0xad, 0xcd, 0x00, 0x23, 0x3d, 0xba, + 0x54, 0x84, 0xb6, 0x29, 0x1f, 0x9d, 0x64, 0x8e, 0xf8, 0x83, 0x44, 0x86, + 0x77, 0x97, 0x9c, 0xec, 0x04, 0xb4, 0x34, 0xa6, 0xac, 0x2e, 0x75, 0xe9, + 0x98, 0x5d, 0xe2, 0x3d, 0xb0, 0x29, 0x2f, 0xc1, 0x11, 0x8c, 0x9f, 0xfa, + 0x9d, 0x81, 0x81, 0xe7, 0x33, 0x8d, 0xb7, 0x92, 0xb7, 0x30, 0xd7, 0xb9, + 0xe3, 0x49, 0x59, 0x2f, 0x68, 0x09, 0x98, 0x72, 0x15, 0x39, 0x15, 0xea, + 0x3d, 0x6b, 0x8b, 0x46, 0x53, 0xc6, 0x33, 0x45, 0x8f, 0x80, 0x3b, 0x32, + 0xa4, 0xc2, 0xe0, 0xf2, 0x72, 0x90, 0x25, 0x6e, 0x4e, 0x3f, 0x8a, 0x3b, + 0x08, 0x38, 0xa1, 0xc4, 0x50, 0xe4, 0xe1, 0x8c, 0x1a, 0x29, 0xa3, 0x7d, + 0xdf, 0x5e, 0xa1, 0x43, 0xde, 0x4b, 0x66, 0xff, 0x04, 0x90, 0x3e, 0xd5, + 0xcf, 0x16, 0x23, 0xe1, 0x58, 0xd4, 0x87, 0xc6, 0x08, 0xe9, 0x7f, 0x21, + 0x1c, 0xd8, 0x1d, 0xca, 0x23, 0xcb, 0x6e, 0x38, 0x07, 0x65, 0xf8, 0x22, + 0xe3, 0x42, 0xbe, 0x48, 0x4c, 0x05, 0x76, 0x39, 0x39, 0x60, 0x1c, 0xd6, + 0x67, 0x02, 0x1d, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, + 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, + 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 875 + {SEC_OID_SHA256, + 875, + {0x30, 0x82, 0x02, 0x0a, 0x02, 0x82, 0x01, 0x01, 0x00, 0x8f, 0x79, 0x35, + 0xd9, 0xb9, 0xaa, 0xe9, 0xbf, 0xab, 0xed, 0x88, 0x7a, 0xcf, 0x49, 0x51, + 0xb6, 0xf3, 0x2e, 0xc5, 0x9e, 0x3b, 0xaf, 0x37, 0x18, 0xe8, 0xea, 0xc4, + 0x96, 0x1f, 0x3e, 0xfd, 0x36, 0x06, 0xe7, 0x43, 0x51, 0xa9, 0xc4, 0x18, + 0x33, 0x39, 0xb8, 0x09, 0xe7, 0xc2, 0xae, 0x1c, 0x53, 0x9b, 0xa7, 0x47, + 0x5b, 0x85, 0xd0, 0x11, 0xad, 0xb8, 0xb4, 0x79, 0x87, 0x75, 0x49, 0x84, + 0x69, 0x5c, 0xac, 0x0e, 0x8f, 0x14, 0xb3, 0x36, 0x08, 0x28, 0xa2, 0x2f, + 0xfa, 0x27, 0x11, 0x0a, 0x3d, 0x62, 0xa9, 0x93, 0x45, 0x34, 0x09, 0xa0, + 0xfe, 0x69, 0x6c, 0x46, 0x58, 0xf8, 0x4b, 0xdd, 0x20, 0x81, 0x9c, 0x37, + 0x09, 0xa0, 0x10, 0x57, 0xb1, 0x95, 0xad, 0xcd, 0x00, 0x23, 0x3d, 0xba, + 0x54, 0x84, 0xb6, 0x29, 0x1f, 0x9d, 0x64, 0x8e, 0xf8, 0x83, 0x44, 0x86, + 0x77, 0x97, 0x9c, 0xec, 0x04, 0xb4, 0x34, 0xa6, 0xac, 0x2e, 0x75, 0xe9, + 0x98, 0x5d, 0xe2, 0x3d, 0xb0, 0x29, 0x2f, 0xc1, 0x11, 0x8c, 0x9f, 0xfa, + 0x9d, 0x81, 0x81, 0xe7, 0x33, 0x8d, 0xb7, 0x92, 0xb7, 0x30, 0xd7, 0xb9, + 0xe3, 0x49, 0x59, 0x2f, 0x68, 0x09, 0x98, 0x72, 0x15, 0x39, 0x15, 0xea, + 0x3d, 0x6b, 0x8b, 0x46, 0x53, 0xc6, 0x33, 0x45, 0x8f, 0x80, 0x3b, 0x32, + 0xa4, 0xc2, 0xe0, 0xf2, 0x72, 0x90, 0x25, 0x6e, 0x4e, 0x3f, 0x8a, 0x3b, + 0x08, 0x38, 0xa1, 0xc4, 0x50, 0xe4, 0xe1, 0x8c, 0x1a, 0x29, 0xa3, 0x7d, + 0xdf, 0x5e, 0xa1, 0x43, 0xde, 0x4b, 0x66, 0xff, 0x04, 0x90, 0x3e, 0xd5, + 0xcf, 0x16, 0x23, 0xe1, 0x58, 0xd4, 0x87, 0xc6, 0x08, 0xe9, 0x7f, 0x21, + 0x1c, 0xd8, 0x1d, 0xca, 0x23, 0xcb, 0x6e, 0x38, 0x07, 0x65, 0xf8, 0x22, + 0xe3, 0x42, 0xbe, 0x48, 0x4c, 0x05, 0x76, 0x39, 0x39, 0x60, 0x1c, 0xd6, + 0x67, 0x02, 0x82, 0x01, 0x01, 0x00, 0x8f, 0x79, 0x35, 0xd9, 0xb9, 0xaa, + 0xe9, 0xbf, 0xab, 0xed, 0x88, 0x7a, 0xcf, 0x49, 0x51, 0xb6, 0xf3, 0x2e, + 0xc5, 0x9e, 0x3b, 0xaf, 0x37, 0x18, 0xe8, 0xea, 0xc4, 0x96, 0x1f, 0x3e, + 0xfd, 0x36, 0x06, 0xe7, 0x43, 0x51, 0xa9, 0xc4, 0x18, 0x33, 0x39, 0xb8, + 0x09, 0xe7, 0xc2, 0xae, 0x1c, 0x53, 0x9b, 0xa7, 0x47, 0x5b, 0x85, 0xd0, + 0x11, 0xad, 0xb8, 0xb4, 0x79, 0x87, 0x75, 0x49, 0x84, 0x69, 0x5c, 0xac, + 0x0e, 0x8f, 0x14, 0xb3, 0x36, 0x08, 0x28, 0xa2, 0x2f, 0xfa, 0x27, 0x11, + 0x0a, 0x3d, 0x62, 0xa9, 0x93, 0x45, 0x34, 0x09, 0xa0, 0xfe, 0x69, 0x6c, + 0x46, 0x58, 0xf8, 0x4b, 0xdd, 0x20, 0x81, 0x9c, 0x37, 0x09, 0xa0, 0x10, + 0x57, 0xb1, 0x95, 0xad, 0xcd, 0x00, 0x23, 0x3d, 0xba, 0x54, 0x84, 0xb6, + 0x29, 0x1f, 0x9d, 0x64, 0x8e, 0xf8, 0x83, 0x44, 0x86, 0x77, 0x97, 0x9c, + 0xec, 0x04, 0xb4, 0x34, 0xa6, 0xac, 0x2e, 0x75, 0xe9, 0x98, 0x5d, 0xe2, + 0x3d, 0xb0, 0x29, 0x2f, 0xc1, 0x11, 0x8c, 0x9f, 0xfa, 0x9d, 0x81, 0x81, + 0xe7, 0x33, 0x8d, 0xb7, 0x92, 0xb7, 0x30, 0xd7, 0xb9, 0xe3, 0x49, 0x59, + 0x2f, 0x68, 0x09, 0x98, 0x72, 0x15, 0x39, 0x15, 0xea, 0x3d, 0x6b, 0x8b, + 0x46, 0x53, 0xc6, 0x33, 0x45, 0x8f, 0x80, 0x3b, 0x32, 0xa4, 0xc2, 0xe0, + 0xf2, 0x72, 0x90, 0x25, 0x6e, 0x4e, 0x3f, 0x8a, 0x3b, 0x08, 0x38, 0xa1, + 0xc4, 0x50, 0xe4, 0xe1, 0x8c, 0x1a, 0x29, 0xa3, 0x7d, 0xdf, 0x5e, 0xa1, + 0x43, 0xde, 0x4b, 0x66, 0xff, 0x04, 0x90, 0x3e, 0xd5, 0xcf, 0x16, 0x23, + 0xe1, 0x58, 0xd4, 0x87, 0xc6, 0x08, 0xe9, 0x7f, 0x21, 0x1c, 0xd8, 0x1d, + 0xca, 0x23, 0xcb, 0x6e, 0x38, 0x07, 0x65, 0xf8, 0x22, 0xe3, 0x42, 0xbe, + 0x48, 0x4c, 0x05, 0x76, 0x39, 0x39, 0x60, 0x1c, 0xd6, 0x67}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 876 + {SEC_OID_SHA256, + 876, + {0x30, 0x82, 0x01, 0x0a, 0x02, 0x82, 0x01, 0x01, 0x00, 0x8f, 0x79, 0x35, + 0xd9, 0xb9, 0xaa, 0xe9, 0xbf, 0xab, 0xed, 0x88, 0x7a, 0xcf, 0x49, 0x51, + 0xb6, 0xf3, 0x2e, 0xc5, 0x9e, 0x3b, 0xaf, 0x37, 0x18, 0xe8, 0xea, 0xc4, + 0x96, 0x1f, 0x3e, 0xfd, 0x36, 0x06, 0xe7, 0x43, 0x51, 0xa9, 0xc4, 0x18, + 0x33, 0x39, 0xb8, 0x09, 0xe7, 0xc2, 0xae, 0x1c, 0x53, 0x9b, 0xa7, 0x47, + 0x5b, 0x85, 0xd0, 0x11, 0xad, 0xb8, 0xb4, 0x79, 0x87, 0x75, 0x49, 0x84, + 0x69, 0x5c, 0xac, 0x0e, 0x8f, 0x14, 0xb3, 0x36, 0x08, 0x28, 0xa2, 0x2f, + 0xfa, 0x27, 0x11, 0x0a, 0x3d, 0x62, 0xa9, 0x93, 0x45, 0x34, 0x09, 0xa0, + 0xfe, 0x69, 0x6c, 0x46, 0x58, 0xf8, 0x4b, 0xdd, 0x20, 0x81, 0x9c, 0x37, + 0x09, 0xa0, 0x10, 0x57, 0xb1, 0x95, 0xad, 0xcd, 0x00, 0x23, 0x3d, 0xba, + 0x54, 0x84, 0xb6, 0x29, 0x1f, 0x9d, 0x64, 0x8e, 0xf8, 0x83, 0x44, 0x86, + 0x77, 0x97, 0x9c, 0xec, 0x04, 0xb4, 0x34, 0xa6, 0xac, 0x2e, 0x75, 0xe9, + 0x98, 0x5d, 0xe2, 0x3d, 0xb0, 0x29, 0x2f, 0xc1, 0x11, 0x8c, 0x9f, 0xfa, + 0x9d, 0x81, 0x81, 0xe7, 0x33, 0x8d, 0xb7, 0x92, 0xb7, 0x30, 0xd7, 0xb9, + 0xe3, 0x49, 0x59, 0x2f, 0x68, 0x09, 0x98, 0x72, 0x15, 0x39, 0x15, 0xea, + 0x3d, 0x6b, 0x8b, 0x46, 0x53, 0xc6, 0x33, 0x45, 0x8f, 0x80, 0x3b, 0x32, + 0xa4, 0xc2, 0xe0, 0xf2, 0x72, 0x90, 0x25, 0x6e, 0x4e, 0x3f, 0x8a, 0x3b, + 0x08, 0x38, 0xa1, 0xc4, 0x50, 0xe4, 0xe1, 0x8c, 0x1a, 0x29, 0xa3, 0x7d, + 0xdf, 0x5e, 0xa1, 0x43, 0xde, 0x4b, 0x66, 0xff, 0x04, 0x90, 0x3e, 0xd5, + 0xcf, 0x16, 0x23, 0xe1, 0x58, 0xd4, 0x87, 0xc6, 0x08, 0xe9, 0x7f, 0x21, + 0x1c, 0xd8, 0x1d, 0xca, 0x23, 0xcb, 0x6e, 0x38, 0x07, 0x65, 0xf8, 0x22, + 0xe3, 0x42, 0xbe, 0x48, 0x4c, 0x05, 0x76, 0x39, 0x39, 0x60, 0x1c, 0xd6, + 0x67, 0x09, 0x03, 0x80, 0xfe, 0x01}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 877 + {SEC_OID_SHA256, + 877, + {0x30, 0x82, 0x01, 0x08, 0x02, 0x82, 0x01, 0x01, 0x00, 0x8f, 0x79, 0x35, + 0xd9, 0xb9, 0xaa, 0xe9, 0xbf, 0xab, 0xed, 0x88, 0x7a, 0xcf, 0x49, 0x51, + 0xb6, 0xf3, 0x2e, 0xc5, 0x9e, 0x3b, 0xaf, 0x37, 0x18, 0xe8, 0xea, 0xc4, + 0x96, 0x1f, 0x3e, 0xfd, 0x36, 0x06, 0xe7, 0x43, 0x51, 0xa9, 0xc4, 0x18, + 0x33, 0x39, 0xb8, 0x09, 0xe7, 0xc2, 0xae, 0x1c, 0x53, 0x9b, 0xa7, 0x47, + 0x5b, 0x85, 0xd0, 0x11, 0xad, 0xb8, 0xb4, 0x79, 0x87, 0x75, 0x49, 0x84, + 0x69, 0x5c, 0xac, 0x0e, 0x8f, 0x14, 0xb3, 0x36, 0x08, 0x28, 0xa2, 0x2f, + 0xfa, 0x27, 0x11, 0x0a, 0x3d, 0x62, 0xa9, 0x93, 0x45, 0x34, 0x09, 0xa0, + 0xfe, 0x69, 0x6c, 0x46, 0x58, 0xf8, 0x4b, 0xdd, 0x20, 0x81, 0x9c, 0x37, + 0x09, 0xa0, 0x10, 0x57, 0xb1, 0x95, 0xad, 0xcd, 0x00, 0x23, 0x3d, 0xba, + 0x54, 0x84, 0xb6, 0x29, 0x1f, 0x9d, 0x64, 0x8e, 0xf8, 0x83, 0x44, 0x86, + 0x77, 0x97, 0x9c, 0xec, 0x04, 0xb4, 0x34, 0xa6, 0xac, 0x2e, 0x75, 0xe9, + 0x98, 0x5d, 0xe2, 0x3d, 0xb0, 0x29, 0x2f, 0xc1, 0x11, 0x8c, 0x9f, 0xfa, + 0x9d, 0x81, 0x81, 0xe7, 0x33, 0x8d, 0xb7, 0x92, 0xb7, 0x30, 0xd7, 0xb9, + 0xe3, 0x49, 0x59, 0x2f, 0x68, 0x09, 0x98, 0x72, 0x15, 0x39, 0x15, 0xea, + 0x3d, 0x6b, 0x8b, 0x46, 0x53, 0xc6, 0x33, 0x45, 0x8f, 0x80, 0x3b, 0x32, + 0xa4, 0xc2, 0xe0, 0xf2, 0x72, 0x90, 0x25, 0x6e, 0x4e, 0x3f, 0x8a, 0x3b, + 0x08, 0x38, 0xa1, 0xc4, 0x50, 0xe4, 0xe1, 0x8c, 0x1a, 0x29, 0xa3, 0x7d, + 0xdf, 0x5e, 0xa1, 0x43, 0xde, 0x4b, 0x66, 0xff, 0x04, 0x90, 0x3e, 0xd5, + 0xcf, 0x16, 0x23, 0xe1, 0x58, 0xd4, 0x87, 0xc6, 0x08, 0xe9, 0x7f, 0x21, + 0x1c, 0xd8, 0x1d, 0xca, 0x23, 0xcb, 0x6e, 0x38, 0x07, 0x65, 0xf8, 0x22, + 0xe3, 0x42, 0xbe, 0x48, 0x4c, 0x05, 0x76, 0x39, 0x39, 0x60, 0x1c, 0xd6, + 0x67, 0x09, 0x01, 0x42}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 878 + {SEC_OID_SHA256, + 878, + {0x30, 0x24, 0x09, 0x03, 0x80, 0xfe, 0x01, 0x02, 0x1d, 0xff, + 0x45, 0x09, 0x69, 0x59, 0x7a, 0x87, 0x08, 0x20, 0x21, 0x18, + 0x05, 0x98, 0x36, 0x88, 0x38, 0x7a, 0x10, 0xcd, 0x4d, 0xcc, + 0x45, 0x1a, 0x7f, 0x3f, 0x43, 0x2a, 0x96, 0xa3}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 879 + {SEC_OID_SHA256, + 879, + {0x30, 0x08, 0x09, 0x03, 0x80, 0xfe, 0x01, 0x02, 0x01, 0x00}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 880 + {SEC_OID_SHA256, + 880, + {0x30, 0x08, 0x09, 0x03, 0x80, 0xfe, 0x01, 0x02, 0x01, 0x01}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 881 + {SEC_OID_SHA256, + 881, + {0x30, 0x08, 0x09, 0x03, 0x80, 0xfe, 0x01, 0x02, 0x01, 0xff}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 882 + {SEC_OID_SHA256, + 882, + {0x30, 0x23, 0x09, 0x03, 0x80, 0xfe, 0x01, 0x02, 0x1c, 0x5d, + 0x7b, 0x4b, 0x53, 0x42, 0xbc, 0x7b, 0xef, 0xef, 0x73, 0xfd, + 0x33, 0xe4, 0xbb, 0xe3, 0xc2, 0xf7, 0x99, 0x59, 0x19, 0xdd, + 0x72, 0xc0, 0x60, 0x5e, 0x6a, 0xb4, 0xae}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 883 + {SEC_OID_SHA256, + 883, + {0x30, 0x23, 0x09, 0x03, 0x80, 0xfe, 0x01, 0x02, 0x1c, 0x5d, + 0x7b, 0x4b, 0x53, 0x42, 0xbc, 0x7b, 0xef, 0xef, 0x73, 0xfd, + 0x33, 0xe4, 0xbb, 0xe3, 0xc2, 0xf7, 0x99, 0x59, 0x19, 0xdd, + 0x72, 0xc0, 0x60, 0x5e, 0x6a, 0xb4, 0xaf}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 884 + {SEC_OID_SHA256, + 884, + {0x30, 0x24, 0x09, 0x03, 0x80, 0xfe, 0x01, 0x02, 0x1d, 0x00, + 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78, 0xf7, 0xdf, 0xde, 0xe7, + 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef, 0x32, 0xb2, 0x33, + 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5c}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 885 + {SEC_OID_SHA256, + 885, + {0x30, 0x24, 0x09, 0x03, 0x80, 0xfe, 0x01, 0x02, 0x1d, 0x00, + 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78, 0xf7, 0xdf, 0xde, 0xe7, + 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef, 0x32, 0xb2, 0x33, + 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5d}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 886 + {SEC_OID_SHA256, + 886, + {0x30, 0x24, 0x09, 0x03, 0x80, 0xfe, 0x01, 0x02, 0x1d, 0x00, + 0xba, 0xf6, 0x96, 0xa6, 0x85, 0x78, 0xf7, 0xdf, 0xde, 0xe7, + 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, 0xef, 0x32, 0xb2, 0x33, + 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5e}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 887 + {SEC_OID_SHA256, + 887, + {0x30, 0x24, 0x09, 0x03, 0x80, 0xfe, 0x01, 0x02, 0x1d, 0x01, + 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, + 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, + 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 888 + {SEC_OID_SHA256, + 888, + {0x30, 0x82, 0x01, 0x0a, 0x09, 0x03, 0x80, 0xfe, 0x01, 0x02, 0x82, 0x01, + 0x01, 0x00, 0x8f, 0x79, 0x35, 0xd9, 0xb9, 0xaa, 0xe9, 0xbf, 0xab, 0xed, + 0x88, 0x7a, 0xcf, 0x49, 0x51, 0xb6, 0xf3, 0x2e, 0xc5, 0x9e, 0x3b, 0xaf, + 0x37, 0x18, 0xe8, 0xea, 0xc4, 0x96, 0x1f, 0x3e, 0xfd, 0x36, 0x06, 0xe7, + 0x43, 0x51, 0xa9, 0xc4, 0x18, 0x33, 0x39, 0xb8, 0x09, 0xe7, 0xc2, 0xae, + 0x1c, 0x53, 0x9b, 0xa7, 0x47, 0x5b, 0x85, 0xd0, 0x11, 0xad, 0xb8, 0xb4, + 0x79, 0x87, 0x75, 0x49, 0x84, 0x69, 0x5c, 0xac, 0x0e, 0x8f, 0x14, 0xb3, + 0x36, 0x08, 0x28, 0xa2, 0x2f, 0xfa, 0x27, 0x11, 0x0a, 0x3d, 0x62, 0xa9, + 0x93, 0x45, 0x34, 0x09, 0xa0, 0xfe, 0x69, 0x6c, 0x46, 0x58, 0xf8, 0x4b, + 0xdd, 0x20, 0x81, 0x9c, 0x37, 0x09, 0xa0, 0x10, 0x57, 0xb1, 0x95, 0xad, + 0xcd, 0x00, 0x23, 0x3d, 0xba, 0x54, 0x84, 0xb6, 0x29, 0x1f, 0x9d, 0x64, + 0x8e, 0xf8, 0x83, 0x44, 0x86, 0x77, 0x97, 0x9c, 0xec, 0x04, 0xb4, 0x34, + 0xa6, 0xac, 0x2e, 0x75, 0xe9, 0x98, 0x5d, 0xe2, 0x3d, 0xb0, 0x29, 0x2f, + 0xc1, 0x11, 0x8c, 0x9f, 0xfa, 0x9d, 0x81, 0x81, 0xe7, 0x33, 0x8d, 0xb7, + 0x92, 0xb7, 0x30, 0xd7, 0xb9, 0xe3, 0x49, 0x59, 0x2f, 0x68, 0x09, 0x98, + 0x72, 0x15, 0x39, 0x15, 0xea, 0x3d, 0x6b, 0x8b, 0x46, 0x53, 0xc6, 0x33, + 0x45, 0x8f, 0x80, 0x3b, 0x32, 0xa4, 0xc2, 0xe0, 0xf2, 0x72, 0x90, 0x25, + 0x6e, 0x4e, 0x3f, 0x8a, 0x3b, 0x08, 0x38, 0xa1, 0xc4, 0x50, 0xe4, 0xe1, + 0x8c, 0x1a, 0x29, 0xa3, 0x7d, 0xdf, 0x5e, 0xa1, 0x43, 0xde, 0x4b, 0x66, + 0xff, 0x04, 0x90, 0x3e, 0xd5, 0xcf, 0x16, 0x23, 0xe1, 0x58, 0xd4, 0x87, + 0xc6, 0x08, 0xe9, 0x7f, 0x21, 0x1c, 0xd8, 0x1d, 0xca, 0x23, 0xcb, 0x6e, + 0x38, 0x07, 0x65, 0xf8, 0x22, 0xe3, 0x42, 0xbe, 0x48, 0x4c, 0x05, 0x76, + 0x39, 0x39, 0x60, 0x1c, 0xd6, 0x67}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 889 + {SEC_OID_SHA256, + 889, + {0x30, 0x0a, 0x09, 0x03, 0x80, 0xfe, 0x01, 0x09, 0x03, 0x80, 0xfe, 0x01}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: Signatures with special case values for r and s. + // tcID: 890 + {SEC_OID_SHA256, + 890, + {0x30, 0x08, 0x09, 0x03, 0x80, 0xfe, 0x01, 0x09, 0x01, 0x42}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: Signature encoding contains wrong type. + // tcID: 891 + {SEC_OID_SHA256, + 891, + {0x30, 0x06, 0x02, 0x01, 0x01, 0x0c, 0x01, 0x30}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: Signature encoding contains wrong type. + // tcID: 892 + {SEC_OID_SHA256, + 892, + {0x30, 0x05, 0x02, 0x01, 0x01, 0x0c, 0x00}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: Signature encoding contains wrong type. + // tcID: 893 + {SEC_OID_SHA256, + 893, + {0x30, 0x09, 0x0c, 0x02, 0x25, 0x73, 0x0c, 0x03, 0x73, 0x25, 0x73}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: Signature encoding contains wrong type. + // tcID: 894 + {SEC_OID_SHA256, + 894, + {0x30, 0x08, 0x02, 0x01, 0x01, 0x30, 0x03, 0x02, 0x01, 0x00}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: Signature encoding contains wrong type. + // tcID: 895 + {SEC_OID_SHA256, + 895, + {0x30, 0x03, 0x02, 0x01, 0x01}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: Signature encoding contains wrong type. + // tcID: 896 + {SEC_OID_SHA256, + 896, + {0x30, 0x06, 0x02, 0x01, 0x01, 0x01, 0x01, 0x00}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + false}, + + // Comment: random signature + // tcID: 897 + {SEC_OID_SHA256, + 897, + {0x30, 0x3c, 0x02, 0x1c, 0x29, 0x64, 0x10, 0xb8, 0xcb, 0x62, 0x00, + 0xed, 0xaf, 0xd1, 0x20, 0x5e, 0x73, 0x77, 0xa0, 0x9a, 0xd2, 0x01, + 0x1a, 0xc7, 0xb1, 0x5b, 0x8b, 0xc9, 0xb9, 0xb4, 0xc6, 0xdb, 0x02, + 0x1c, 0x25, 0xca, 0x28, 0x3c, 0x86, 0x8d, 0xc2, 0xa5, 0xce, 0x86, + 0xaa, 0xfc, 0xf6, 0x81, 0xce, 0x21, 0xd6, 0x60, 0xb4, 0x61, 0xda, + 0x48, 0x27, 0x0f, 0x15, 0xb5, 0x38, 0x89}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + true}, + + // Comment: random signature + // tcID: 898 + {SEC_OID_SHA256, + 898, + {0x30, 0x3d, 0x02, 0x1c, 0x34, 0x7c, 0x4f, 0x68, 0x75, 0xbf, 0x44, + 0x76, 0xaf, 0xbd, 0xd6, 0xb2, 0xb1, 0xf9, 0xe3, 0x5c, 0x87, 0x0e, + 0x78, 0x5e, 0x70, 0x8e, 0x66, 0x11, 0x09, 0xbd, 0x06, 0x8e, 0x02, + 0x1d, 0x00, 0xb0, 0xb9, 0x08, 0xa6, 0x17, 0xd3, 0xad, 0x6c, 0x8b, + 0xc2, 0x77, 0xf3, 0x97, 0x09, 0x5c, 0x00, 0xe6, 0x59, 0xc8, 0x6c, + 0xa7, 0xc6, 0x00, 0x09, 0x05, 0x71, 0xab, 0x17}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + true}, + + // Comment: random signature + // tcID: 899 + {SEC_OID_SHA256, + 899, + {0x30, 0x3c, 0x02, 0x1c, 0x3c, 0x76, 0xbc, 0x6f, 0x17, 0x36, 0x94, + 0x14, 0xd4, 0xc2, 0x1c, 0x53, 0x61, 0xed, 0x0c, 0xca, 0x6e, 0x79, + 0xf7, 0x3f, 0x90, 0x70, 0x6f, 0x1f, 0x7c, 0xa9, 0xf0, 0x5a, 0x02, + 0x1c, 0x3c, 0xc6, 0x0d, 0x8a, 0x0d, 0x44, 0xfb, 0x96, 0x7b, 0xaa, + 0x0e, 0x56, 0x21, 0xe1, 0x2c, 0xd4, 0x34, 0xaa, 0xfd, 0x74, 0x8c, + 0xba, 0x3e, 0x7c, 0xdc, 0x73, 0x3b, 0x2f}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + true}, + + // Comment: random signature + // tcID: 900 + {SEC_OID_SHA256, + 900, + {0x30, 0x3e, 0x02, 0x1d, 0x00, 0x86, 0xa5, 0xef, 0xea, 0x8e, 0x6a, + 0x80, 0x33, 0xb8, 0xa0, 0x03, 0x4b, 0x52, 0xae, 0x61, 0x4e, 0x1f, + 0x14, 0xfb, 0xcb, 0xfa, 0x0b, 0xb5, 0x01, 0x94, 0xef, 0xa6, 0xa7, + 0x02, 0x1d, 0x00, 0xb3, 0xd6, 0x6f, 0x6d, 0x2b, 0x10, 0xcf, 0xe6, + 0x2f, 0xe9, 0x6b, 0x78, 0xfc, 0xf4, 0x1c, 0xa7, 0xb4, 0x42, 0xac, + 0xeb, 0x98, 0xab, 0x10, 0x9a, 0x01, 0x40, 0x9e, 0x4a}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + true}, + + // Comment: random signature + // tcID: 901 + {SEC_OID_SHA256, + 901, + {0x30, 0x3d, 0x02, 0x1c, 0x16, 0x72, 0x7d, 0x52, 0xbd, 0x71, 0x1e, + 0x9a, 0x63, 0xe0, 0xdd, 0x2c, 0x4d, 0xb0, 0x45, 0xcf, 0xb9, 0x93, + 0x94, 0x2b, 0x1e, 0x39, 0xe4, 0xf4, 0x3a, 0x65, 0xc1, 0x1a, 0x02, + 0x1d, 0x00, 0x9f, 0xb9, 0xc0, 0x2d, 0x10, 0xc9, 0x68, 0xe7, 0x5b, + 0xb1, 0x5a, 0xca, 0xb8, 0x46, 0x7f, 0x30, 0xb8, 0x44, 0x81, 0xf6, + 0x79, 0xe1, 0x36, 0xe8, 0xaf, 0x65, 0xa2, 0x66}, + kPubKey3, + {0x54, 0x65, 0x73, 0x74}, + true}, + + // Comment: r,s = 1,1 + // tcID: 902 + {SEC_OID_SHA256, + 902, + {0x30, 0x06, 0x02, 0x01, 0x01, 0x02, 0x01, 0x01}, + kPubKey6, + {0x54, 0x65, 0x73, 0x74}, + true}, + + // Comment: r,s = 1,5 + // tcID: 903 + {SEC_OID_SHA256, + 903, + {0x30, 0x06, 0x02, 0x01, 0x01, 0x02, 0x01, 0x05}, + kPubKey6, + {0x54, 0x65, 0x73, 0x74}, + true}, + + // Comment: u2 small + // tcID: 904 + {SEC_OID_SHA256, + 904, + {0x30, 0x22, 0x02, 0x01, 0x01, 0x02, 0x1d, 0x00, 0x95, 0x92, 0x12, 0x1e, + 0xd1, 0x2d, 0x93, 0x19, 0x7f, 0x1f, 0xfb, 0x86, 0x3a, 0xc6, 0x39, 0x37, + 0xf2, 0x8e, 0xf4, 0xf6, 0x2f, 0x1e, 0x00, 0x9a, 0x30, 0xaa, 0xba, 0xb1}, + kPubKey6, + {0x54, 0x65, 0x73, 0x74}, + true}, + + // Comment: s == q-1 + // tcID: 905 + {SEC_OID_SHA256, + 905, + {0x30, 0x22, 0x02, 0x01, 0x01, 0x02, 0x1d, 0x00, 0xba, 0xf6, 0x96, 0xa6, + 0x85, 0x78, 0xf7, 0xdf, 0xde, 0xe7, 0xfa, 0x67, 0xc9, 0x77, 0xc7, 0x85, + 0xef, 0x32, 0xb2, 0x33, 0xba, 0xe5, 0x80, 0xc0, 0xbc, 0xd5, 0x69, 0x5c}, + kPubKey6, + {0x54, 0x65, 0x73, 0x74}, + true}, + + // Comment: s == 1 + // tcID: 906 + {SEC_OID_SHA256, + 906, + {0x30, 0x21, 0x02, 0x1c, 0x5a, 0x25, 0x2f, 0x4f, 0xc5, 0x56, 0x18, 0x74, + 0x7f, 0xd9, 0x4b, 0x13, 0xc9, 0xbe, 0xe6, 0x2b, 0xb9, 0x58, 0xd8, 0x57, + 0x77, 0xcb, 0x07, 0xdd, 0x90, 0x71, 0x0d, 0x24, 0x02, 0x01, 0x01}, + kPubKey7, + {0x54, 0x65, 0x73, 0x74}, + true}}; + +#endif // dsa_vectors_h__ |